Automated code remediation:
The software industrial revolution has arrived. There's an explosion of custom applications today, and we assemble them faster than ever from third-party and open source software. But as applications grow in complexity and vulnerabilities mount, updating software becomes a tedious, intractable...
Saved in:
Main Authors: | , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Sebastopol, CA
O'Reilly Media, Inc.
2023
|
Edition: | First edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781098150884/?ar |
Summary: | The software industrial revolution has arrived. There's an explosion of custom applications today, and we assemble them faster than ever from third-party and open source software. But as applications grow in complexity and vulnerabilities mount, updating software becomes a tedious, intractable part of a developer's job. When you fail to keep up, the software becomes less secure and harder to maintain and eventually stops working. This report explains how organizations can stay on top of software vulnerabilities and maintenance, freeing developers to focus on creating new solutions. The practice of automated code remediation is a next-generation code search and scanning technology that goes beyond search to fix issues automatically across the enterprise codebase. When you automate code refactoring and remediation, code quality and security improve. Developer experience is also enhanced, accelerating the impact your business can make. |
Physical Description: | 1 Online-Ressource (44 Seiten) illustrations |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-092809480 | ||
003 | DE-627-1 | ||
005 | 20240228122004.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230530s2023 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)092809480 | ||
035 | |a (DE-599)KEP092809480 | ||
035 | |a (ORHE)9781098150884 | ||
035 | |a (DE-627-1)092809480 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.13 |2 23/eng/20230524 | |
100 | 1 | |a Johnson, Pat |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Automated code remediation |c by Pat Johnson, Olga Kundzich, and Jonathan Schneider |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media, Inc. |c 2023 | |
300 | |a 1 Online-Ressource (44 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a The software industrial revolution has arrived. There's an explosion of custom applications today, and we assemble them faster than ever from third-party and open source software. But as applications grow in complexity and vulnerabilities mount, updating software becomes a tedious, intractable part of a developer's job. When you fail to keep up, the software becomes less secure and harder to maintain and eventually stops working. This report explains how organizations can stay on top of software vulnerabilities and maintenance, freeing developers to focus on creating new solutions. The practice of automated code remediation is a next-generation code search and scanning technology that goes beyond search to fix issues automatically across the enterprise codebase. When you automate code refactoring and remediation, code quality and security improve. Developer experience is also enhanced, accelerating the impact your business can make. | ||
650 | 0 | |a Computer programming | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Programmation (Informatique) | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a computer programming | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer programming | |
700 | 1 | |a Kundzich, Olga |e VerfasserIn |4 aut | |
700 | 1 | |a Schneider, Jonathan |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098150884/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-092809480 |
---|---|
_version_ | 1829007847360299008 |
adam_text | |
any_adam_object | |
author | Johnson, Pat Kundzich, Olga Schneider, Jonathan |
author_facet | Johnson, Pat Kundzich, Olga Schneider, Jonathan |
author_role | aut aut aut |
author_sort | Johnson, Pat |
author_variant | p j pj o k ok j s js |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)092809480 (DE-599)KEP092809480 (ORHE)9781098150884 |
dewey-full | 005.13 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.13 |
dewey-search | 005.13 |
dewey-sort | 15.13 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02407cam a22004212c 4500</leader><controlfield tag="001">ZDB-30-ORH-092809480</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122004.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230530s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092809480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092809480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098150884</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092809480</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.13</subfield><subfield code="2">23/eng/20230524</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johnson, Pat</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automated code remediation</subfield><subfield code="c">by Pat Johnson, Olga Kundzich, and Jonathan Schneider</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (44 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The software industrial revolution has arrived. There's an explosion of custom applications today, and we assemble them faster than ever from third-party and open source software. But as applications grow in complexity and vulnerabilities mount, updating software becomes a tedious, intractable part of a developer's job. When you fail to keep up, the software becomes less secure and harder to maintain and eventually stops working. This report explains how organizations can stay on top of software vulnerabilities and maintenance, freeing developers to focus on creating new solutions. The practice of automated code remediation is a next-generation code search and scanning technology that goes beyond search to fix issues automatically across the enterprise codebase. When you automate code refactoring and remediation, code quality and security improve. Developer experience is also enhanced, accelerating the impact your business can make.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programmation (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kundzich, Olga</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schneider, Jonathan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098150884/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-092809480 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:36:48Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (44 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | Johnson, Pat VerfasserIn aut Automated code remediation by Pat Johnson, Olga Kundzich, and Jonathan Schneider First edition. Sebastopol, CA O'Reilly Media, Inc. 2023 1 Online-Ressource (44 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The software industrial revolution has arrived. There's an explosion of custom applications today, and we assemble them faster than ever from third-party and open source software. But as applications grow in complexity and vulnerabilities mount, updating software becomes a tedious, intractable part of a developer's job. When you fail to keep up, the software becomes less secure and harder to maintain and eventually stops working. This report explains how organizations can stay on top of software vulnerabilities and maintenance, freeing developers to focus on creating new solutions. The practice of automated code remediation is a next-generation code search and scanning technology that goes beyond search to fix issues automatically across the enterprise codebase. When you automate code refactoring and remediation, code quality and security improve. Developer experience is also enhanced, accelerating the impact your business can make. Computer programming Computer networks Security measures Programmation (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures computer programming Computer networks ; Security measures Kundzich, Olga VerfasserIn aut Schneider, Jonathan VerfasserIn aut |
spellingShingle | Johnson, Pat Kundzich, Olga Schneider, Jonathan Automated code remediation Computer programming Computer networks Security measures Programmation (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures computer programming Computer networks ; Security measures |
title | Automated code remediation |
title_auth | Automated code remediation |
title_exact_search | Automated code remediation |
title_full | Automated code remediation by Pat Johnson, Olga Kundzich, and Jonathan Schneider |
title_fullStr | Automated code remediation by Pat Johnson, Olga Kundzich, and Jonathan Schneider |
title_full_unstemmed | Automated code remediation by Pat Johnson, Olga Kundzich, and Jonathan Schneider |
title_short | Automated code remediation |
title_sort | automated code remediation |
topic | Computer programming Computer networks Security measures Programmation (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures computer programming Computer networks ; Security measures |
topic_facet | Computer programming Computer networks Security measures Programmation (Informatique) Réseaux d'ordinateurs ; Sécurité ; Mesures computer programming Computer networks ; Security measures |
work_keys_str_mv | AT johnsonpat automatedcoderemediation AT kundzicholga automatedcoderemediation AT schneiderjonathan automatedcoderemediation |