Discover the new cybersecurity landscape of the interconnected software supply chain
In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll explore real-world examples and guidance on how to defend your own organization against internal and external attacks. It includes coverage of topics including the history of the software transparency movement, software bills of materials, and high assurance attestations.
The authors examine the background of attack vectors that are becoming increasingly vulnerable, like mobile and social networks, retail and banking systems, and infrastructure and defense systems. You’ll also discover:
An essential resource for cybersecurity and application security professionals, Software Transparency will also be of extraordinary benefit to industrial control system, cloud, and mobile security professionals.
"synopsis" may belong to another edition of this title.
CHRIS HUGHES is the co-founder and Chief Information Security Officer of Aquia. He is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and the University of Maryland Global Campus, and a co-host of the Resilient Cyber Podcast.
TONY TURNER has 25 years’ experience as a cybersecurity engineer, architect, consultant, executive, and community builder. He is the Founder of Opswright, a software company creating solutions for security engineering in critical infrastructure and leads the OWASP Orlando chapter.
Explore the cybersecurity implications of the interconnected software supply chain
In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of dedicated information security executives and professionals delivers an incisive and essential new treatment of software supply chain security. In the book, you’ll find real-world examples of how to defend your own organization against attack. It includes coverage of topics ranging from the history of the software transparency movement to software bills of materials and high assurance attestations in a rapidly evolving software landscape.
The authors explain the background of attack vectors that are becoming increasingly vulnerable, including mobile and social networks, banking and retail systems, and even the critical infrastructure and defense systems upon which we all rely. You’ll discover how you can defend against threats to these networks and explore use cases and practical guidance for both software consumers and the suppliers who support them.
A can’t-miss resource for cybersecurity and application security professionals, Software Transparency will also earn a central place on the bookshelves of professionals working in industrial control system security, cloud security, mobile security, DevOps, and DevSecOps. The book offers extensive coverage of:
"About this title" may belong to another edition of this title.
Seller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_391781756
Seller: Big River Books, Powder Springs, GA, U.S.A.
Condition: good. This book is in good condition. The cover has minor creases or bends. The binding is tight and pages are intact. Some pages may have writing or highlighting. Seller Inventory # BRV.1394158483.G
Seller: medimops, Berlin, Germany
Condition: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Seller Inventory # M01394158483-G
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 44591599-n
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: New. Brand New. Seller Inventory # 9781394158485
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 44591599
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, youll explore real-world examples and guidance on how to defend your own organization against internal and external attacks. It includes coverage of topics including the history of the software transparency movement, software bills of materials, and high assurance attestations. The authors examine the background of attack vectors that are becoming increasingly vulnerable, like mobile and social networks, retail and banking systems, and infrastructure and defense systems. Youll also discover: Use cases and practical guidance for both software consumers and suppliersDiscussions of firmware and embedded software, as well as cloud and connected APIsStrategies for understanding federal and defense software supply chain initiatives related to securityAn essential resource for cybersecurity and application security professionals, Software Transparency will also be of extraordinary benefit to industrial control system, cloud, and mobile security professionals. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781394158485
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Paperback. Condition: New. Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you'll explore real-world examples and guidance on how to defend your own organization against internal and external attacks. It includes coverage of topics including the history of the software transparency movement, software bills of materials, and high assurance attestations. The authors examine the background of attack vectors that are becoming increasingly vulnerable, like mobile and social networks, retail and banking systems, and infrastructure and defense systems. You'll also discover: Use cases and practical guidance for both software consumers and suppliersDiscussions of firmware and embedded software, as well as cloud and connected APIsStrategies for understanding federal and defense software supply chain initiatives related to securityAn essential resource for cybersecurity and application security professionals, Software Transparency will also be of extraordinary benefit to industrial control system, cloud, and mobile security professionals. Seller Inventory # LU-9781394158485
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # FW-9781394158485
Quantity: 15 available
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
Condition: new. Seller Inventory # WOU2PXWMYN
Quantity: Over 20 available