The rise of continuous packaging: understanding and securing software supply chains in the cloud
How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now mor...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media, Inc.
2022
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781098117344/?ar |
Zusammenfassung: | How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. What can you do? Simple package management strategies are not enough. You need a single source of truth for dependencies that you consume and artifacts you create. And you need to own the process of packaging your software artifacts, all the way from build to deployment and delivery. You need a global hub of trusted software. That's where continuous packaging (CP) comes in. In this report, you'll learn how CP gives your teams security, control, visibility, and management over incoming and built assets. You will: Understand how CP helps to secure a supply chain Learn what continuous packaging is and why it's crucial to CI/CD pipelines Discover software supply chain risks and their solutions Define strategies to mitigate those risks Identify the ways continuous packaging helps secure software development. |
Umfang: | 1 online resource (40 pages) color illustrations |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-077854640 | ||
003 | DE-627-1 | ||
005 | 20240228121612.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220513s2022 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)077854640 | ||
035 | |a (DE-599)KEP077854640 | ||
035 | |a (ORHE)9781098117344 | ||
035 | |a (DE-627-1)077854640 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.3 |2 23 | |
100 | 1 | |a McKinney, Dan |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The rise of continuous packaging |b understanding and securing software supply chains in the cloud |c Dan McKinney and Ciara Carey |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media, Inc. |c 2022 | |
300 | |a 1 online resource (40 pages) |b color illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. What can you do? Simple package management strategies are not enough. You need a single source of truth for dependencies that you consume and artifacts you create. And you need to own the process of packaging your software artifacts, all the way from build to deployment and delivery. You need a global hub of trusted software. That's where continuous packaging (CP) comes in. In this report, you'll learn how CP gives your teams security, control, visibility, and management over incoming and built assets. You will: Understand how CP helps to secure a supply chain Learn what continuous packaging is and why it's crucial to CI/CD pipelines Discover software supply chain risks and their solutions Define strategies to mitigate those risks Identify the ways continuous packaging helps secure software development. | ||
650 | 0 | |a Computer software |x Security measures | |
650 | 0 | |a Cyberinfrastructure |x Security measures | |
650 | 4 | |a Logiciels ; Sécurité ; Mesures | |
650 | 4 | |a Computer software ; Security measures | |
650 | 4 | |a Cyberinfrastructure ; Security measures | |
700 | 1 | |a Carey, Ciara |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098117344/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-077854640 |
---|---|
_version_ | 1833357029039669248 |
adam_text | |
any_adam_object | |
author | McKinney, Dan Carey, Ciara |
author_facet | McKinney, Dan Carey, Ciara |
author_role | aut aut |
author_sort | McKinney, Dan |
author_variant | d m dm c c cc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)077854640 (DE-599)KEP077854640 (ORHE)9781098117344 |
dewey-full | 005.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.3 |
dewey-search | 005.3 |
dewey-sort | 15.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02545cam a22003972c 4500</leader><controlfield tag="001">ZDB-30-ORH-077854640</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121612.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220513s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077854640</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP077854640</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098117344</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)077854640</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">McKinney, Dan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The rise of continuous packaging</subfield><subfield code="b">understanding and securing software supply chains in the cloud</subfield><subfield code="c">Dan McKinney and Ciara Carey</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (40 pages)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. What can you do? Simple package management strategies are not enough. You need a single source of truth for dependencies that you consume and artifacts you create. And you need to own the process of packaging your software artifacts, all the way from build to deployment and delivery. You need a global hub of trusted software. That's where continuous packaging (CP) comes in. In this report, you'll learn how CP gives your teams security, control, visibility, and management over incoming and built assets. You will: Understand how CP helps to secure a supply chain Learn what continuous packaging is and why it's crucial to CI/CD pipelines Discover software supply chain risks and their solutions Define strategies to mitigate those risks Identify the ways continuous packaging helps secure software development.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberinfrastructure</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberinfrastructure ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Carey, Ciara</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098117344/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-077854640 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:11Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (40 pages) color illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | McKinney, Dan VerfasserIn aut The rise of continuous packaging understanding and securing software supply chains in the cloud Dan McKinney and Ciara Carey First edition. Sebastopol, CA O'Reilly Media, Inc. 2022 1 online resource (40 pages) color illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. What can you do? Simple package management strategies are not enough. You need a single source of truth for dependencies that you consume and artifacts you create. And you need to own the process of packaging your software artifacts, all the way from build to deployment and delivery. You need a global hub of trusted software. That's where continuous packaging (CP) comes in. In this report, you'll learn how CP gives your teams security, control, visibility, and management over incoming and built assets. You will: Understand how CP helps to secure a supply chain Learn what continuous packaging is and why it's crucial to CI/CD pipelines Discover software supply chain risks and their solutions Define strategies to mitigate those risks Identify the ways continuous packaging helps secure software development. Computer software Security measures Cyberinfrastructure Security measures Logiciels ; Sécurité ; Mesures Computer software ; Security measures Cyberinfrastructure ; Security measures Carey, Ciara VerfasserIn aut |
spellingShingle | McKinney, Dan Carey, Ciara The rise of continuous packaging understanding and securing software supply chains in the cloud Computer software Security measures Cyberinfrastructure Security measures Logiciels ; Sécurité ; Mesures Computer software ; Security measures Cyberinfrastructure ; Security measures |
title | The rise of continuous packaging understanding and securing software supply chains in the cloud |
title_auth | The rise of continuous packaging understanding and securing software supply chains in the cloud |
title_exact_search | The rise of continuous packaging understanding and securing software supply chains in the cloud |
title_full | The rise of continuous packaging understanding and securing software supply chains in the cloud Dan McKinney and Ciara Carey |
title_fullStr | The rise of continuous packaging understanding and securing software supply chains in the cloud Dan McKinney and Ciara Carey |
title_full_unstemmed | The rise of continuous packaging understanding and securing software supply chains in the cloud Dan McKinney and Ciara Carey |
title_short | The rise of continuous packaging |
title_sort | rise of continuous packaging understanding and securing software supply chains in the cloud |
title_sub | understanding and securing software supply chains in the cloud |
topic | Computer software Security measures Cyberinfrastructure Security measures Logiciels ; Sécurité ; Mesures Computer software ; Security measures Cyberinfrastructure ; Security measures |
topic_facet | Computer software Security measures Cyberinfrastructure Security measures Logiciels ; Sécurité ; Mesures Computer software ; Security measures Cyberinfrastructure ; Security measures |
work_keys_str_mv | AT mckinneydan theriseofcontinuouspackagingunderstandingandsecuringsoftwaresupplychainsinthecloud AT careyciara theriseofcontinuouspackagingunderstandingandsecuringsoftwaresupplychainsinthecloud AT mckinneydan riseofcontinuouspackagingunderstandingandsecuringsoftwaresupplychainsinthecloud AT careyciara riseofcontinuouspackagingunderstandingandsecuringsoftwaresupplychainsinthecloud |