0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

CyberSecurity in a DevOps Environment - From Requirements to Monitoring: Andrey Sadovykh, Dragos Truscan, Wissam Mallouli, Ana... CyberSecurity in a DevOps Environment - From Requirements to Monitoring
Andrey Sadovykh, Dragos Truscan, Wissam Mallouli, Ana Rosa Cavalli, Cristina Seceleanu, …
R4,632 Discovery Miles 46 320 Ships in 10 - 15 working days

This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous monitoring.  It presents an overview of the latest techniques and tools that help engineers and developers verify the security requirements of large-scale industrial systems and explains novel methods that enable a faster feedback loop for verifying security-related activities, which rely on techniques such as automated testing, model checking, static analysis, runtime monitoring, and formal methods. The book consists of three parts, each covering a different aspect of security engineering in the DevOps context. The first part, "Security Requirements", explains how to specify and analyse security issues in a formal way. The second part, "Prevention at Development Time", offers a practical and industrial perspective on how to design, develop and verify secure applications. The third part, "Protection at Operations", eventually introduces tools for continuous monitoring of security events and incidents. Overall, it covers several advanced topics related to security verification, such as optimizing security verification activities, automatically creating verifiable specifications from security requirements and vulnerabilities, and using these security specifications to verify security properties against design specifications and generate artifacts such as tests or monitors that can be used later in the DevOps process. The book aims at computer engineers in general and does not require specific knowledge. In particular, it is intended for software architects, developers, testers, security professionals, and tool providers, who want to define, build, test, and verify secure applications, Web services, and industrial systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Folk Of The Air 3: The Queen Of…
Holly Black Hardcover  (1)
R554 R514 Discovery Miles 5 140
Like Sodium In Water - A Memoir Of Home…
Hayden Eastwood Paperback  (1)
R354 Discovery Miles 3 540
Shudu u wana Vhutolo Hawe
Shudufhadzo Musida Paperback R160 R148 Discovery Miles 1 480
Indentured - Behind The Scenes At Gupta…
Rajesh Sundaram Paperback  (2)
R234 Discovery Miles 2 340
Advanced Python Commands - Become a…
Manuel Mcfeely Hardcover R781 R685 Discovery Miles 6 850
Models for Capitalizing on Web…
Ghazi I. Alkhatib Hardcover R4,832 Discovery Miles 48 320
SQL - The Ultimate Beginner's…
Brandon Cooper Hardcover R791 R689 Discovery Miles 6 890
Web Services - Concepts, Methodologies…
Information Reso Management Association Hardcover R8,959 Discovery Miles 89 590
All Dhal'd Up - Every Day, Indian-ish…
Kamini Pather Hardcover R420 R319 Discovery Miles 3 190
How Physics Makes Us Free
J. T. Ismael Hardcover R1,192 Discovery Miles 11 920

 

Partners