Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer security ; Information resources ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Open source software is amazing, but it's also a complicated beast when it comes to ownership, trust, and security. Many organizations operate mission critical systems with the help of open source libraries, unaware that some of these libraries include vulnerabilities that hackers can easily exploit. This type of vulnerability led to the 2017 Equifax breach. In this practical report, author Guy Podjarny provides a framework to help you continuously find and fix known vulnerabilities in the open source libraries you use. Every software library has potential pitfalls, and vulnerable dependencies are prime targets. Aimed at architects and practitioners in development and application security, this report walks you through practices and tools to protect your applications at scale. Understand what known vulnerabilities are and why they matter Learn how to find and fix vulnerabilities in open source libraries Integrate testing to prevent adding new vulnerable libraries to your code Respond to newly disclosed vulnerabilities in libraries you already use Learn which aspects matter most when choosing a Software Composition Analysis (SCA) testing tool
    Note: Description based on online resource; title from title page (Safari, viewed December 11, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (55 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn how to adapt your practices to this new organizational reality by adopting a developer-first cloud native application security (CNAS) approach. Author Guy Podjarny explains this market transition and guides you through the organizational changes required to succeed, including alterations to security practices and tooling. Concrete examples not only help you learn the concepts but also act as an ideal way to get started in the process. By the end of this report, you'll understand why and how to embrace a CNAS approach. Initiate dev-first security by equipping developers with the mandate and tools to secure what they build during the development process Expand the scope of application security for cloud native apps to include controls that IT security previously handled Learn how adopting CNAS requires significant changes to the way you secure applications and infrastructure Adapt your organization to a dev-first CNAS approach by rethinking your security organizational structure, tooling, and priorities
    Note: Online resource; Title from title page (viewed June 25, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (63 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Serverless is taking the cloud native world by storm. This new approach promises extraordinary value, from increased developer productivity to dramatic cost savings. In some aspects, serverless also boasts significant security advantages compared to the server model. But as this practical report explains, securing serverless still requires diligence from the developers and application security professionals involved in the process. Guy Podjarny and Liran Tal from Snyk examine the significant benefits that serverless brings to application security, as well as the considerable risks involved when you configure a serverless system. You'll also learn a platform-agnostic security model known as CLAD that will help you address C ode vulnerabilities, L ibrary vulnerabilities, A ccess and permissions, and D ata security. This report helps you: Understand what serverless is and how this model evolved from cloud native processes Explore the three primary areas where serverless improves security Learn how the CLAD model provides four categories to help you home in on specific security issues Follow a detailed example that demonstrates how poor security manifests in real-world serverless applications
    Note: Online resource; Title from title page (viewed November 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Application software ; Development ; Application software ; Design ; Mobile computing ; Web site development ; Electronic books ; Electronic books ; local
    Abstract: Is Responsive Web Design (RWD) slowing your site down? It doesn't have to. With this concise book, you'll learn practical techniques for improving performance with RWD, including a default set of guidelines you can use as an easy starting point. Web performance researcher and evangelist Guy Podjarny walks you through several existing solutions for dealing with RWD performance problems, and offers advice for choosing optimizations that will be most useful for your needs.
    Note: Description based on online resource; title from title page (Safari, viewed Aug. 22, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 15 min., 13 sec.)) , digital, sound, color
    Keywords: Computer security ; Electronic videos ; local
    Abstract: "If your code is working great but it isn't secure, it won't be working great for long. This collection of talks shows ways to harden your projects, and explores the question of whether truly secure communications should run alongside the Web rather than in it."--Resource description page.
    Note: Title from resource description page (Safari, viewed July 26, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Language: English
    Pages: 1 online resource (1 audio file (59 min.))
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Cloud computing Security measures ; Audiobooks
    Abstract: Join us for a special conversation on cloud and open source security with Sam Newman and Snyk founder and president Guy Podjarny. They'll explore the many security challenges software engineers face in a cloud native and serverless world and discuss how to deal with breaches when they arise. They'll also talk about some of the benefits (and hurdles) of working with open source; supply chain security (and why it's so important but so complicated); what recent breaches can tell us about protecting ourselves moving forward--and more.
    Note: Online resource; title from title details screen (O'Reilly, viewed November 8, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: 1 online resource (1 video file (1 hr.)) , sound, color.
    Edition: [First edition].
    DDC: 004.67/82
    Keywords: Cloud computing Security measures ; Instructional films ; Internet videos ; Nonfiction films ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: Join us for a special conversation with Sam Newman and guest Guy Podjarny, where they will discuss the many challenges software engineers face for security in a Cloud Native and Serverless world and how to deal with breaches when they arise. They'll also talk about some of the challenges and benefits of working with open source and will cover supply chain security and how it is so important but also so complicated and what recent breaches can tell us about protecting ourselves moving forward. Sam and Guy will spend a few minutes covering the trends that are influencing infrastructure and then tell you what you need to know to stay ahead of the curve. What you'll learn and how you can apply it Explore the origins and opportunities around working with open source and cloud native technologies--and why security is so important What's coming next for infrastructure and ops This recording of a live event is for you because... You want to learn about cloud native, serverless, and open source security and how to secure your supply chain. You're looking for ways to implement DevOps best practices and streamline your value delivery. Recommended follow-up: Read Cloud Native Application Security (report) Read Securing Open Source Libraries (report) Read Serverless Security (report).
    Note: Online resource; title from title details screen (O'Reilly, viewed June 21, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...