|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1310473363 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220412s2022 caua o 000 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCO
|d OCLCF
|d OCLCQ
|
020 |
|
|
|z 9781098127343
|
029 |
1 |
|
|a AU@
|b 000071547125
|
035 |
|
|
|a (OCoLC)1310473363
|
037 |
|
|
|a 9781098127350
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Conrad, Peter,
|e author.
|
245 |
1 |
0 |
|a Shifting left for application security :
|b bridging the divide between DevOps and security with the right security tools /
|c by Peter Conrad.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media, Inc.,
|c 2022.
|
300 |
|
|
|a 1 online resource (39 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Security is a paramount concern for developers, operations and security engineers, and company CISOs alike. Security remains crucial from the earliest phases of application design and development through deployment and support. Rather than bolting on a few security tests at the end of the process, many teams today are shifting security left by using tools and processes to address security from the earliest phases of the pipeline. In this report, author Peter Conrad explains why "shifting left" is important and how you can apply this practice in your organization. Once you understand the challenges companies face under pressure to deliver applications faster and more securely, you'll be able to create security recommendations for your own organization--including strategies for making security a top priority for everyone.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|
650 |
|
7 |
|a Computer networks
|x Access control.
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Information technology
|x Management.
|2 fast
|0 (OCoLC)fst00973112
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098127350/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|