Software supply chain security
securing the end-to-end supply chain for software, firmware, and hardware
Seiten
2024
|
1. Auflage
O'Reilly Media (Verlag)
978-1-0981-3370-2 (ISBN)
O'Reilly Media (Verlag)
978-1-0981-3370-2 (ISBN)
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.
This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.
With this book, you'll learn how to:
Pinpoint the cybersecurity risks in each part of your organization's software supply chain
Find the cybersecurity frameworks and resources that can improve security
Identify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurement
Design initiatives and controls for each part of the supply chain using existing frameworks and references
Evaluate third-party risk in your supply chain
This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.
With this book, you'll learn how to:
Pinpoint the cybersecurity risks in each part of your organization's software supply chain
Find the cybersecurity frameworks and resources that can improve security
Identify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurement
Design initiatives and controls for each part of the supply chain using existing frameworks and references
Evaluate third-party risk in your supply chain
Erscheinungsdatum | 13.02.2024 |
---|---|
Zusatzinfo | Illustrationen |
Verlagsort | Sebastopol |
Sprache | englisch |
Maße | 178 x 232 mm |
Einbandart | kartoniert |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 1-0981-3370-6 / 1098133706 |
ISBN-13 | 978-1-0981-3370-2 / 9781098133702 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95