Agile application security: enabling security in a continuous delivery pipeline
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile...
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media
[2017]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781491938836/?ar |
Zusammenfassung: | Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. You'll learn how to:Add security practices to each stage of your existing development lifecycleIntegrate security with planning, requirements, design, and at the code levelInclude security testing as part of your team's effort to deliver working software in each releaseImplement regulatory compliance in an agile or DevOps environmentBuild an effective security program through a culture of empathy, openness, transparency, and collaboration |
Beschreibung: | Includes index. - Online resource; title from title page (viewed January 13, 2017) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781491938812 1491938811 9781491938799 149193879X 9781491938836 1491938838 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047615362 | ||
003 | DE-627-1 | ||
005 | 20240228120223.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9781491938812 |c electronic bk. |9 978-1-4919-3881-2 | ||
020 | |a 1491938811 |c electronic bk. |9 1-4919-3881-1 | ||
020 | |a 9781491938799 |c electronic bk. |9 978-1-4919-3879-9 | ||
020 | |a 149193879X |c electronic bk. |9 1-4919-3879-X | ||
020 | |a 9781491938836 |9 978-1-4919-3883-6 | ||
020 | |a 1491938838 |9 1-4919-3883-8 | ||
035 | |a (DE-627-1)047615362 | ||
035 | |a (DE-599)KEP047615362 | ||
035 | |a (ORHE)9781491938836 | ||
035 | |a (DE-627-1)047615362 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Bell, Laura |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Agile application security |b enabling security in a continuous delivery pipeline |c Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Birda |
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c [2017] | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from title page (viewed January 13, 2017) | ||
520 | |a Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. You'll learn how to:Add security practices to each stage of your existing development lifecycleIntegrate security with planning, requirements, design, and at the code levelInclude security testing as part of your team's effort to deliver working software in each releaseImplement regulatory compliance in an agile or DevOps environmentBuild an effective security program through a culture of empathy, openness, transparency, and collaboration | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Agile software development | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Méthodes agiles (Développement de logiciels) | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Agile software development | |
650 | 4 | |a Computer security | |
700 | 1 | |a Brunton-Spall, Michael |e VerfasserIn |4 aut | |
700 | 1 | |a Smith, Rich |e VerfasserIn |4 aut | |
700 | 1 | |a Bird, Jim |e VerfasserIn |4 aut | |
776 | 1 | |z 9781491938843 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781491938843 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781491938836/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047615362 |
---|---|
_version_ | 1821494872522096640 |
adam_text | |
any_adam_object | |
author | Bell, Laura Brunton-Spall, Michael Smith, Rich Bird, Jim |
author_facet | Bell, Laura Brunton-Spall, Michael Smith, Rich Bird, Jim |
author_role | aut aut aut aut |
author_sort | Bell, Laura |
author_variant | l b lb m b s mbs r s rs j b jb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047615362 (DE-599)KEP047615362 (ORHE)9781491938836 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03339cam a22005652 4500</leader><controlfield tag="001">ZDB-30-ORH-047615362</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120223.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491938812</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4919-3881-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491938811</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4919-3881-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491938799</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4919-3879-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">149193879X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4919-3879-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491938836</subfield><subfield code="9">978-1-4919-3883-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491938838</subfield><subfield code="9">1-4919-3883-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047615362</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047615362</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781491938836</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047615362</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bell, Laura</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Agile application security</subfield><subfield code="b">enabling security in a continuous delivery pipeline</subfield><subfield code="c">Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Birda</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from title page (viewed January 13, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. You'll learn how to:Add security practices to each stage of your existing development lifecycleIntegrate security with planning, requirements, design, and at the code levelInclude security testing as part of your team's effort to deliver working software in each releaseImplement regulatory compliance in an agile or DevOps environmentBuild an effective security program through a culture of empathy, openness, transparency, and collaboration</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Agile software development</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Méthodes agiles (Développement de logiciels)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Agile software development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brunton-Spall, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Rich</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bird, Jim</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781491938843</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781491938843</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781491938836/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047615362 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:17Z |
institution | BVB |
isbn | 9781491938812 1491938811 9781491938799 149193879X 9781491938836 1491938838 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Bell, Laura VerfasserIn aut Agile application security enabling security in a continuous delivery pipeline Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Birda Sebastopol, CA O'Reilly Media [2017] 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from title page (viewed January 13, 2017) Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. You'll learn how to:Add security practices to each stage of your existing development lifecycleIntegrate security with planning, requirements, design, and at the code levelInclude security testing as part of your team's effort to deliver working software in each releaseImplement regulatory compliance in an agile or DevOps environmentBuild an effective security program through a culture of empathy, openness, transparency, and collaboration Computer security Agile software development Computer Security Sécurité informatique Méthodes agiles (Développement de logiciels) COMPUTERS ; Security ; General Brunton-Spall, Michael VerfasserIn aut Smith, Rich VerfasserIn aut Bird, Jim VerfasserIn aut 9781491938843 Erscheint auch als Druck-Ausgabe 9781491938843 |
spellingShingle | Bell, Laura Brunton-Spall, Michael Smith, Rich Bird, Jim Agile application security enabling security in a continuous delivery pipeline Computer security Agile software development Computer Security Sécurité informatique Méthodes agiles (Développement de logiciels) COMPUTERS ; Security ; General |
title | Agile application security enabling security in a continuous delivery pipeline |
title_auth | Agile application security enabling security in a continuous delivery pipeline |
title_exact_search | Agile application security enabling security in a continuous delivery pipeline |
title_full | Agile application security enabling security in a continuous delivery pipeline Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Birda |
title_fullStr | Agile application security enabling security in a continuous delivery pipeline Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Birda |
title_full_unstemmed | Agile application security enabling security in a continuous delivery pipeline Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Birda |
title_short | Agile application security |
title_sort | agile application security enabling security in a continuous delivery pipeline |
title_sub | enabling security in a continuous delivery pipeline |
topic | Computer security Agile software development Computer Security Sécurité informatique Méthodes agiles (Développement de logiciels) COMPUTERS ; Security ; General |
topic_facet | Computer security Agile software development Computer Security Sécurité informatique Méthodes agiles (Développement de logiciels) COMPUTERS ; Security ; General |
work_keys_str_mv | AT belllaura agileapplicationsecurityenablingsecurityinacontinuousdeliverypipeline AT bruntonspallmichael agileapplicationsecurityenablingsecurityinacontinuousdeliverypipeline AT smithrich agileapplicationsecurityenablingsecurityinacontinuousdeliverypipeline AT birdjim agileapplicationsecurityenablingsecurityinacontinuousdeliverypipeline |