Agile application security : enabling security in a continuous delivery pipeline

"Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of...

Full description

Bibliographic Details
Main Author: Bell, Laura
Other Involved Persons: Brunton-Spall, Michael ; Smith, Richard J. ; Bird, Jim
Format: Book
Language:English
Published: Beijing Boston Farnham Sebastopol Tokyo : O'Reilly September 2017
Edition:First edition
ISBN:1491938846
9781491938843
Physical Description:xviii, 363 Seiten 179 x 235 x 24
Other Editions:Show all 2 Editions
Further Information:Cover
Cover
QR Code: Show QR Code
LEADER 04092cam a2200613 4500
001 1004988141
003 DE-627
005 20190902145035.0
007 tu
008 171118s2017 xx ||||| 00| ||eng c
020 |a 1491938846  |9 1-4919-3884-6 
020 |a 9781491938843  |9 978-1-4919-3884-3 
035 |a (DE-627)1004988141 
035 |a (DE-599)OBVAC14487404 
035 |a (OCoLC)1013585412 
035 |a (AT-OBV)AC14487404 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XB-CN  |c XD-US  |c XA-GB 
050 0 |a QA76.9.A25 
082 0 |a 005.8  |2 23 
100 1 |a Bell, Laura 
245 1 0 |a Agile application security  |b enabling security in a continuous delivery pipeline  |c Laura Bell, Michael Brunton-Spall, Rich Smith, and Jim Bird 
250 |a First edition 
264 1 |a Beijing  |a Boston  |a Farnham  |a Sebastopol  |a Tokyo  |b O'Reilly  |c September 2017 
300 |a xviii, 363 Seiten  |c 179 x 235 x 24 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
501 |a Getting started with security -- Agile enablers -- Welcome to the Agile revolution -- Working with your existing Agile life cycle -- Security and requirements -- Agile vulnerability management -- Risk for Agile teams -- Threat assessments and understanding attacks -- Building secure and usable systems -- Code review for security -- Agile security testing -- External reviews, testing, and advice -- Operations and OpSec -- Compliance -- Security culture -- What does Agile security mean? 
520 |a "Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. You'll learn how to: add security practices to each stage of your existing development lifecycle; integrate security with planning, requirements, design, and at the code level Include security testing as part of your team's effort to deliver working software in each release; implement regulatory compliance in an agile or DevOps environment; build an effective security program through a culture of empathy, openness, transparency, and collaboration."--Publisher description 
591 |a B 
689 0 0 |D s  |0 (DE-588)4806620-5  |0 (DE-627)474767612  |0 (DE-576)216579171  |a Agile Softwareentwicklung  |2 gnd 
689 0 1 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 0 |5 (DE-627) 
700 1 |a Brunton-Spall, Michael  |e verfasserin  |4 aut 
700 1 |a Smith, Richard J.  |d 1951-  |e verfasserin  |0 (DE-588)124449484  |0 (DE-627)706639081  |0 (DE-576)294177264  |4 aut 
700 1 |a Bird, Jim  |e verfasserin  |4 aut 
856 4 2 |u http://vub.de/cover/data/isbn:9781491938843/medium/true/de/vub/cover.jpg  |x cover  |z Cover 
856 4 2 |u http://vub.de/cover/data/isbn%3A9781491938843/medium/true/de/vub/cover.jpg  |x cover  |z Cover 
912 |a GBV-vub-HSOS-PDA 
912 |a GBV_ILN_32 
912 |a SYSFLAG_1 
912 |a GBV_KXP 
912 |a GBV_ILN_70 
912 |a GBV_ILN_105 
951 |a BO 
980 |2 32  |1 02  |b 1798379937  |f 53  |d INF SR 870 B433  |e u  |k 2017-09-08: first release  |x 3400  |y k  |z 15-01-19 
980 |2 70  |1 01  |b 1780718829  |d T18 B 2593  |e u  |x 0089  |y z  |z 02-09-19 
980 |2 105  |1 01  |b 1783305614  |d FHL,ZV bestellt  |e a  |l zkacq. - storniert  |x 0841  |y a  |z 11-07-18 
983 |2 32  |1 00  |8 00  |a SR 870 
984 |2 32  |1 02  |a ILM1$005522633 
984 |2 70  |1 01  |a 89$14107888X 
985 |2 32  |1 02  |a 18 A 3645