|
|
|
|
LEADER |
02294pam a22004451i 4500 |
001 |
181-020433027 |
003 |
Uk |
005 |
20220127023119.0 |
006 |
m || d | |
007 |
cr ||||||||||| |
008 |
211208s2022 flu ob 001|0|eng|d |
015 |
|
|
|a GBC1L3819
|2 bnb
|
020 |
|
|
|a 9781000543421 (ePub ebook) :
|c £56.99
|
020 |
|
|
|z 9781032206479 (hbk.) :
|c £150.00
|
020 |
|
|
|z 9781032151205 (pbk.) :
|c £56.99
|
020 |
|
|
|a 9781000543414 (PDF ebook) :
|c £56.99
|
020 |
|
|
|a 9781003265566 (ebook) :
|c £56.99
|
024 |
7 |
|
|a 10.1201/9781003265566
|2 doi
|
037 |
|
|
|a 9781000543421
|b Ingram Content Group
|
040 |
|
|
|a StDuBDS
|b eng
|c StDuBDS
|d Uk
|e rda
|e pn
|
042 |
|
|
|a ukblsr
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Merkow, Mark S.
|e author.
|1 https://isni.org/isni/0000000082700625
|
245 |
1 |
0 |
|a Practical security for Agile and DevOps
|c Mark S. Merkow
|
250 |
|
|
|a 1st
|
264 |
|
1 |
|a Boca Raton
|b Auerbach
|c 2022
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
|
|
|a Description based on CIP data; resource not viewed.
|
505 |
0 |
|
|a <P>Chapter 1: Today’s Software Development Practices Shatter Old Security Practices<BR>Chapter 2: Deconstructing Agile and Scrum<BR>Chapter 3: Learning Is FUNdamental!<BR>Chapter 4: Product Backlog Development—Building Security In<BR>Chapter 5: Secure Design Considerations<BR>Chapter 6: Security in the Design Sprint<BR>Chapter 7: Defensive Programming<BR>Chapter 8: Testing Part 1: Static Code Analysis<BR>Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP<BR>Chapter 10: Securing DevOps<BR>Chapter 11: Metrics and Models for AppSec Maturity<BR>Chapter 12: Frontiers for AppSec<BR>Chapter 13: AppSec Is a Marathon—Not a Sprint!<BR>Appendix A: Security Acceptance Criteria<BR>Appendix B: Resources for AppSec<BR>Appendix C: Answers to Chapter Quick Check Questions<BR></P>
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Agile software development.
|
776 |
0 |
8 |
|i Print version :
|z 9781032206479
|
859 |
|
|
|a ELD
|b ebook
|
852 |
|
|
|a British Library
|b HMNTS
|c DRT
|j ELD.DS.663233
|
903 |
|
|
|a ELD.DS.663233
|
980 |
|
|
|a 020433027
|b 181
|c sid-181-col-blfidbbi
|
SOLR
_version_ |
1778756016371924992 |
access_facet |
Electronic Resources |
author |
Merkow, Mark S. |
author_facet |
Merkow, Mark S. |
author_role |
aut |
author_sort |
Merkow, Mark S. |
author_variant |
m s m ms msm |
building |
Library A |
callnumber-sort |
|
collection |
sid-181-col-blfidbbi |
contents |
<P>Chapter 1: Today’s Software Development Practices Shatter Old Security Practices<BR>Chapter 2: Deconstructing Agile and Scrum<BR>Chapter 3: Learning Is FUNdamental!<BR>Chapter 4: Product Backlog Development—Building Security In<BR>Chapter 5: Secure Design Considerations<BR>Chapter 6: Security in the Design Sprint<BR>Chapter 7: Defensive Programming<BR>Chapter 8: Testing Part 1: Static Code Analysis<BR>Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP<BR>Chapter 10: Securing DevOps<BR>Chapter 11: Metrics and Models for AppSec Maturity<BR>Chapter 12: Frontiers for AppSec<BR>Chapter 13: AppSec Is a Marathon—Not a Sprint!<BR>Appendix A: Security Acceptance Criteria<BR>Appendix B: Resources for AppSec<BR>Appendix C: Answers to Chapter Quick Check Questions<BR></P> |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
doi_str_mv |
10.1201/9781003265566 |
edition |
1st |
facet_avail |
Online |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
181-020433027 |
illustrated |
Not Illustrated |
imprint |
Boca Raton, Auerbach, 2022 |
imprint_str_mv |
Boca Raton Auerbach 2022 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9781000543421 (ePub ebook) :, 9781000543414 (PDF ebook) :, 9781003265566 (ebook) : |
isbn_isn_mv |
9781032206479 (hbk.) :, 9781032151205 (pbk.) :, 9781032206479 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:25:27.034Z |
marc024a_ct_mv |
10.1201/9781003265566 |
match_str |
merkow2022practicalsecurityforagileanddevops |
mega_collection |
British Library Catalogue |
physical |
1 online resource |
publishDate |
2022 |
publishDateSort |
2022 |
publishPlace |
Boca Raton |
publisher |
Auerbach |
record_format |
marcfinc |
record_id |
020433027 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
181 |
spelling |
Merkow, Mark S. author. https://isni.org/isni/0000000082700625, Practical security for Agile and DevOps Mark S. Merkow, 1st, Boca Raton Auerbach 2022, 1 online resource., text rdacontent, computer rdamedia, online resource rdacarrier, Includes bibliographical references and index., Description based on CIP data; resource not viewed., <P>Chapter 1: Today’s Software Development Practices Shatter Old Security Practices<BR>Chapter 2: Deconstructing Agile and Scrum<BR>Chapter 3: Learning Is FUNdamental!<BR>Chapter 4: Product Backlog Development—Building Security In<BR>Chapter 5: Secure Design Considerations<BR>Chapter 6: Security in the Design Sprint<BR>Chapter 7: Defensive Programming<BR>Chapter 8: Testing Part 1: Static Code Analysis<BR>Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP<BR>Chapter 10: Securing DevOps<BR>Chapter 11: Metrics and Models for AppSec Maturity<BR>Chapter 12: Frontiers for AppSec<BR>Chapter 13: AppSec Is a Marathon—Not a Sprint!<BR>Appendix A: Security Acceptance Criteria<BR>Appendix B: Resources for AppSec<BR>Appendix C: Answers to Chapter Quick Check Questions<BR></P>, Computer security., Agile software development., Print version : 9781032206479, ELD ebook, British Library HMNTS DRT ELD.DS.663233 |
spellingShingle |
Merkow, Mark S., Practical security for Agile and DevOps, <P>Chapter 1: Today’s Software Development Practices Shatter Old Security Practices<BR>Chapter 2: Deconstructing Agile and Scrum<BR>Chapter 3: Learning Is FUNdamental!<BR>Chapter 4: Product Backlog Development—Building Security In<BR>Chapter 5: Secure Design Considerations<BR>Chapter 6: Security in the Design Sprint<BR>Chapter 7: Defensive Programming<BR>Chapter 8: Testing Part 1: Static Code Analysis<BR>Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP<BR>Chapter 10: Securing DevOps<BR>Chapter 11: Metrics and Models for AppSec Maturity<BR>Chapter 12: Frontiers for AppSec<BR>Chapter 13: AppSec Is a Marathon—Not a Sprint!<BR>Appendix A: Security Acceptance Criteria<BR>Appendix B: Resources for AppSec<BR>Appendix C: Answers to Chapter Quick Check Questions<BR></P>, Computer security., Agile software development. |
title |
Practical security for Agile and DevOps |
title_auth |
Practical security for Agile and DevOps |
title_full |
Practical security for Agile and DevOps Mark S. Merkow |
title_fullStr |
Practical security for Agile and DevOps Mark S. Merkow |
title_full_unstemmed |
Practical security for Agile and DevOps Mark S. Merkow |
title_short |
Practical security for Agile and DevOps |
title_sort |
practical security for agile and devops |
topic |
Computer security., Agile software development. |
topic_facet |
Computer security., Agile software development. |