New ArrivalsEasterClothing, Shoes & AccessoriesHomeKitchen & DiningOutdoor Living & GardenFurnitureGroceryHousehold EssentialsBabyBeautyPersonal CareHealthWellnessBackpacks & LuggageSports & OutdoorsToysElectronicsVideo GamesMovies, Music & BooksSchool & Office SuppliesParty SuppliesGift IdeasGift CardsPetsUlta Beauty at TargetShop by CommunityTarget OpticalDealsClearanceTarget New ArrivalsRoller Rabbit x TargetEasterHome Decor Ideas & TrendsTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Software Supply Chain Security - by  Cassie Crossley (Paperback) - 1 of 1

Software Supply Chain Security - by Cassie Crossley (Paperback)

$36.50Save $19.49 (35% off)

In Stock

Free & easy returns

Free & easy returns

Return this item by mail or in store within 90 days for a full refund.
Eligible for registries and wish lists

About this item

Highlights

  • Trillions of lines of code help us in our lives, companies, and organizations.
  • Author(s): Cassie Crossley
  • 242 Pages
  • Computers + Internet, Security

Description



About the Book



"Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. With this book, you'll learn how to: pinpoint the cybersecurity risks in each part of your organization's software supply chain; identify the roles that participate in the supply chain -- including IT, development, operations, manufacturing, and procurement; design initiatives and controls for each part of the supply chain using existing frameworks and references; implement secure development lifecycle, source code security, software build management, and software transparency practices; evaluate third-party risk in your supply chain"--



Book Synopsis



Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.

This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.

With this book, you'll learn how to:

  • Pinpoint the cybersecurity risks in each part of your organization's software supply chain
  • Identify the roles that participate in the supply chain--including IT, development, operations, manufacturing, and procurement
  • Design initiatives and controls for each part of the supply chain using existing frameworks and references
  • Implement secure development lifecycle, source code security, software build management, and software transparency practices
  • Evaluate third-party risk in your supply chain
Dimensions (Overall): 9.19 Inches (H) x 7.0 Inches (W) x .51 Inches (D)
Weight: .87 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 242
Genre: Computers + Internet
Sub-Genre: Security
Publisher: O'Reilly Media
Theme: Networking
Format: Paperback
Author: Cassie Crossley
Language: English
Street Date: March 12, 2024
TCIN: 89478113
UPC: 9781098133702
Item Number (DPCI): 247-29-3147
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.51 inches length x 7 inches width x 9.19 inches height
Estimated ship weight: 0.87 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO, Alaska, Hawaii

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, delivered to the guest, delivered by a Shipt shopper, or picked up by the guest.
See the return policy for complete information.

Q: What framework does the author suggest using for design initiatives?

submitted by AI Shopping Assistant - 2 days ago
  • A: The author suggests using existing frameworks and references for designing security initiatives in the supply chain.

    submitted byAI Shopping Assistant - 2 days ago
    Ai generated

Q: Who is the author of this software security book?

submitted by AI Shopping Assistant - 2 days ago
  • A: The book is authored by Cassie Crossley, an expert in software supply chain security.

    submitted byAI Shopping Assistant - 2 days ago
    Ai generated

Q: How does the book approach third-party risk evaluation?

submitted by AI Shopping Assistant - 2 days ago
  • A: It offers strategies for assessing and managing third-party risks within the software supply chain.

    submitted byAI Shopping Assistant - 2 days ago
    Ai generated

Q: What is the intended audience for this book?

submitted by AI Shopping Assistant - 2 days ago
  • A: This book is recommended for readers aged 22 years and up, including professionals in IT and software development.

    submitted byAI Shopping Assistant - 2 days ago
    Ai generated

Q: What key topics does this book cover regarding software security?

submitted by AI Shopping Assistant - 2 days ago
  • A: The book covers cybersecurity risks, roles in the supply chain, and practical controls for securing software.

    submitted byAI Shopping Assistant - 2 days ago
    Ai generated

Additional product information and recommendations

Get top deals, latest trends, and more.

Privacy policy

Footer

About Us

About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

Help

Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member ServicesLegal & Privacy

Stores

Find a StoreClinicPharmacyTarget OpticalMore In-Store Services

Services

Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacy PolicyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy