Cargando…

10 steps every CISO should take to secure next-gen software /

As countless breaches have proved, application security is no longer optional. But most established and trusted app sec tools were developed 10-15 years ago for a different world of software development. The next generation of software brings a different set of risks that requires new processes to m...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Blake, Cindy (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, [2020]
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1139751065
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 200207s2020 caua o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d CZL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9781492082903 
029 1 |a AU@  |b 000071521172 
035 |a (OCoLC)1139751065 
037 |a CL0501000095  |b Safari Books Online 
050 4 |a HF5548.375 
049 |a UAMI 
100 1 |a Blake, Cindy,  |e author. 
245 1 0 |a 10 steps every CISO should take to secure next-gen software /  |c Cindy Blake. 
246 3 |a Ten steps every chief information security officer should take to secure next-generation software 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c [2020] 
264 4 |c ©2020 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed February 6, 2020). 
520 |a As countless breaches have proved, application security is no longer optional. But most established and trusted app sec tools were developed 10-15 years ago for a different world of software development. The next generation of software brings a different set of risks that requires new processes to manage. This report examines the security implications involved in next-generation software, from the code itself to the methodologies by which it's developed and the infrastructure surrounding its use. Cindy Blake shows you what this new software landscape looks like, covering new and evolving development technologies, tools, and frameworks and why they're relevant to security. CISOs will see why cloud native and serverless architectures (for building software) and DevOps and Agile methodologies (for managing it) are critical areas for application security as they learn the 10 steps for securing next-generation software. Discover the DevOps principles that CISOs often overlook Explore three critical shifts of next-gen software and how they impact security Dive into a next-gen application security program Get practical advice for securing next generation software. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer software  |x Development. 
650 0 |a Information technology  |x Management  |x Security measures. 
650 0 |a Chief information officers. 
650 6 |a Technologie de l'information  |x Gestion  |x Sécurité  |x Mesures. 
650 6 |a Chefs des services de l'information. 
650 7 |a Chief information officers  |2 fast 
650 7 |a Computer software  |x Development  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492082910/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP