Trillions of lines of code help us in our lives, companies, and organizations.
Author(s): Cassie Crossley
242 Pages
Computers + Internet, Security
Description
About the Book
"Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. With this book, you'll learn how to: pinpoint the cybersecurity risks in each part of your organization's software supply chain; identify the roles that participate in the supply chain -- including IT, development, operations, manufacturing, and procurement; design initiatives and controls for each part of the supply chain using existing frameworks and references; implement secure development lifecycle, source code security, software build management, and software transparency practices; evaluate third-party risk in your supply chain"--
Book Synopsis
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.
This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.
With this book, you'll learn how to:
Pinpoint the cybersecurity risks in each part of your organization's software supply chain
Identify the roles that participate in the supply chain--including IT, development, operations, manufacturing, and procurement
Design initiatives and controls for each part of the supply chain using existing frameworks and references
Implement secure development lifecycle, source code security, software build management, and software transparency practices
Evaluate third-party risk in your supply chain
Dimensions (Overall): 9.19 Inches (H) x 7.0 Inches (W) x .51 Inches (D)
Weight: .87 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 242
Genre: Computers + Internet
Sub-Genre: Security
Publisher: O'Reilly Media
Theme: Networking
Format: Paperback
Author: Cassie Crossley
Language: English
Street Date: March 12, 2024
TCIN: 89478113
UPC: 9781098133702
Item Number (DPCI): 247-29-3147
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.
Shipping details
Estimated ship dimensions: 0.51 inches length x 7 inches width x 9.19 inches height
Estimated ship weight: 0.87 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO, Alaska, Hawaii
Return details
This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, delivered to the guest, delivered by a Shipt shopper, or picked up by the guest.