|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1015686912 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
171218t20172018caua o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCA
|d MERER
|d TOH
|d STF
|d OCLCQ
|d CEF
|d OCLCF
|d KSU
|d OCLCQ
|d DEBBG
|d G3B
|d S9I
|d UAB
|d VT2
|d OCLCQ
|d CZL
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 1491996978
|
020 |
|
|
|a 9781491996973
|
020 |
|
|
|z 9781491996973
|
029 |
1 |
|
|a GBVCP
|b 1014936713
|
035 |
|
|
|a (OCoLC)1015686912
|
037 |
|
|
|a CL0500000920
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 658.478
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Podjarny, Guy,
|e author.
|
245 |
1 |
0 |
|a Securing open source libraries :
|b managing vulnerabilities in open source code packages /
|c Guy Podjarny.
|
246 |
3 |
0 |
|a Managing vulnerabilities in open source code packages
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2017.
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed December 11, 2017).
|
520 |
|
|
|a Open source software is amazing, but it's also a complicated beast when it comes to ownership, trust, and security. Many organizations operate mission critical systems with the help of open source libraries, unaware that some of these libraries include vulnerabilities that hackers can easily exploit. This type of vulnerability led to the 2017 Equifax breach. In this practical report, author Guy Podjarny provides a framework to help you continuously find and fix known vulnerabilities in the open source libraries you use. Every software library has potential pitfalls, and vulnerable dependencies are prime targets. Aimed at architects and practitioners in development and application security, this report walks you through practices and tools to protect your applications at scale. Understand what known vulnerabilities are and why they matter Learn how to find and fix vulnerabilities in open source libraries Integrate testing to prevent adding new vulnerable libraries to your code Respond to newly disclosed vulnerabilities in libraries you already use Learn which aspects matter most when choosing a Software Composition Analysis (SCA) testing tool.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Information resources
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Sources d'information
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491996980/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|