Target New ArrivalsGift Ideas for MomClothing, Shoes & AccessoriesHome & DecorKitchen & DiningOutdoor Living & GardenGroceryHousehold EssentialsBabyBeautyPersonal CareHealthWellnessLuggageSports & OutdoorsToysElectronicsVideo GamesMovies, Music & BooksSchool & Office SuppliesParty SuppliesGift IdeasGift CardsPetsUlta Beauty at TargetShop by CommunityTarget OpticalDealsClearanceTarget New ArrivalsSpring OutfitsGift Ideas for MomWomen’s Festival OutfitsTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Identity Security for Software Development - by  John Walsh & Uzi Ailon & Matt Barker (Paperback) - 1 of 1

Identity Security for Software Development - by John Walsh & Uzi Ailon & Matt Barker (Paperback)

$35.33Save $24.66 (41% off)

In Stock

Free & easy returns

Free & easy returns

Return this item by mail or in store within 90 days for a full refund.
Eligible for registries and wish lists

About this item

Highlights

  • Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development.
  • Author(s): John Walsh & Uzi Ailon & Matt Barker
  • 205 Pages
  • Computers + Internet, Security

Description



Book Synopsis



Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

  • What developers need to know about managing secrets and identity to build safer apps
  • What machine identities, secrets, and credentials are--and how to secure them
  • How to secure the software supply chain to build safer apps
  • How identity security fits into modern software development practices
Dimensions (Overall): 9.19 Inches (H) x 7.0 Inches (W) x .44 Inches (D)
Weight: .75 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 205
Genre: Computers + Internet
Sub-Genre: Security
Publisher: O'Reilly Media
Theme: Online Safety & Privacy
Format: Paperback
Author: John Walsh & Uzi Ailon & Matt Barker
Language: English
Street Date: June 10, 2025
TCIN: 93462070
UPC: 9781098158033
Item Number (DPCI): 247-48-8356
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.44 inches length x 7 inches width x 9.19 inches height
Estimated ship weight: 0.75 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO, Alaska, Hawaii

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, delivered to the guest, delivered by a Shipt shopper, or picked up by the guest.
See the return policy for complete information.

Q: Who are the authors of this book?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book is authored by John Walsh, Uzi Ailon, and Matt Barker.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What is the suggested age for readers of this book?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book is suggested for readers aged 22 years and up.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What type of format is this book available in?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book is available in paperback format.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What key topics are covered in the book?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book covers managing secrets, machine identities, authentication, authorization, access control, and securing the software supply chain.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What is the primary focus of the content?

submitted by AI Shopping Assistant - 1 month ago
  • A: The content focuses on integrating identity security into software development practices from the beginning.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Additional product information and recommendations

Discover more options

Trending Computers & Technology Books

Get top deals, latest trends, and more.

Privacy policy