Cargando…

Manage the risks of software reuse : whether or not your organization develops software, it's likely exposed to the risks of vulnerabilities buried deep within code /

Current software development practices rely heavily on the use of preexisting components, typically sourced from public repositories, to add functionality. The recent discovery of a critical vulnerability in a commonly used component called Log4j highlights the risks of software reuse: It affected e...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Vial, Gregory (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : MIT Sloan Management Review, [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1331411954
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220621s2022 xx a ob 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA  |d OCLCF  |d OCLCQ  |d OCLCO 
024 8 |a 53863MIT63414 
029 1 |a AU@  |b 000072141987 
035 |a (OCoLC)1331411954 
037 |a 53863MIT63414  |b O'Reilly Media 
050 4 |a QA76.76.R47 
082 0 4 |a 005.1  |2 23/eng/20220621 
049 |a UAMI 
100 1 |a Vial, Gregory,  |e author. 
245 1 0 |a Manage the risks of software reuse :  |b whether or not your organization develops software, it's likely exposed to the risks of vulnerabilities buried deep within code /  |c Gregory Vial. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b MIT Sloan Management Review,  |c [2022] 
300 |a 1 online resource (6 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a "Reprint 63414." 
504 |a Includes bibliographical references. 
520 |a Current software development practices rely heavily on the use of preexisting components, typically sourced from public repositories, to add functionality. The recent discovery of a critical vulnerability in a commonly used component called Log4j highlights the risks of software reuse: It affected every piece of software that includes the component. The authors provide four key insights for leaders as they consider how their organizations can manage the risks of software reuse. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer software  |x Reusability. 
650 0 |a Computer software  |x Quality control. 
650 6 |a Logiciels  |x Réutilisation. 
650 6 |a Logiciels  |x Qualité  |x Contrôle. 
650 7 |a Computer software  |x Quality control  |2 fast 
650 7 |a Computer software  |x Reusability  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/53863MIT63414/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP