Agile application security : enabling security in a continuous delivery pipeline

"Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of...

Full description

Saved in:
Bibliographic Details
Main Authors Bell, Laura (Author), Brunton-Spall, Michael (Author), Smith, Rich (Author), Bird, Jim (Author)
Format Electronic eBook
LanguageEnglish
Published Sebastopol, CA : O'Reilly Media, [2017]
Subjects
Online AccessFull text
ISBN9781491938812
9781491938799
Physical Description1 online zdroj (1 volume) : ilustrace

Cover

LEADER 00000cam a2200000 i 4500
001 93569
003 CZ-ZlUTB
005 20251008101028.0
006 m o d
007 cr |n
008 170116s2017 caua fof 001 0 eng d
999 |c 93569  |d 93569 
020 |a 9781491938812  |q (ebook) 
020 |a 9781491938799  |q (ebook) 
035 |a (OCoLC)968714978  |z (OCoLC)1003504459 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d OCLCF  |d OCLCQ  |d N$T  |d IDEBK  |d N$T  |d TEFOD  |d EBLCP  |d YDX  |d OCLCA  |d VT2  |d HCO  |d UOK  |d KSU 
072 7 |a 004.4/.6  |x Programování. Software  |2 Konspekt  |9 23 
080 |a 004.415  |2 MRF 
080 |a 004.056  |2 MRF 
080 |a (035)  |2 MRF 
080 |a (0.034.2:08)  |2 MRF 
100 1 |a Bell, Laura,  |e author. 
245 1 0 |a Agile application security :  |b enabling security in a continuous delivery pipeline /  |c Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Birda. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c [2017] 
300 |a 1 online zdroj (1 volume) :  |b ilustrace 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
500 |a Obsahuje index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity 
520 |a "Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development.Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them.You'll learn how to:Add security practices to each stage of your existing development lifecycleIntegrate security with planning, requirements, design, and at the code levelInclude security testing as part of your team's effort to deliver working software in each releaseImplement regulatory compliance in an agile or DevOps environmentBuild an effective security program through a culture of empathy, openness, transparency, and collaboration." -- Resumé vydavatele 
588 |a Description based on online resource; title from title page (viewed January 13, 2017). 
590 |a eBooks on EBSCOhost  |b All EBSCO eBooks 
650 0 7 |a vývoj softwaru  |2 czenas  |7 ph127838 
650 0 7 |a počítačová bezpečnost  |2 czenas  |7 ph165952 
650 0 9 |a software development  |2 eczenas 
650 0 9 |a computer security  |2 eczenas 
653 0 |a agilní metody 
655 7 |a příručky  |2 czenas  |7 fd133209 
655 7 |a elektronické knihy  |2 czenas  |7 fd186907 
655 9 |a handbooks and manuals  |2 eczenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Brunton-Spall, Michael,  |e author. 
700 1 |a Smith, Rich,  |e author. 
700 1 |a Bird, Jim,  |e author. 
776 0 8 |c Original  |z 9781491938843  |z 1491938846  |w (OCoLC)945947645 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1591085&authtype=ip,shib&custid=s3936755 
942 |2 udc 
992 |c EBOOK-TN  |c EBSCO 
993 |x NEPOSILAT  |y EIZ