Agile Application Security Agile Application Security

Agile Application Security

Enabling Security in a Continuous Delivery Pipeline

Laura Bell and Others
    • $49.99
    • $49.99

Publisher Description

Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development.

Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them.

You’ll learn how to:
Add security practices to each stage of your existing development lifecycleIntegrate security with planning, requirements, design, and at the code levelInclude security testing as part of your team’s effort to deliver working software in each releaseImplement regulatory compliance in an agile or DevOps environmentBuild an effective security program through a culture of empathy, openness, transparency, and collaboration

GENRE
Computers & Internet
RELEASED
2017
September 8
LANGUAGE
EN
English
LENGTH
386
Pages
PUBLISHER
O'Reilly Media
SELLER
O Reilly Media, Inc.
SIZE
4.4
MB
Building Secure and Reliable Systems Building Secure and Reliable Systems
2020
Agile Information Security Agile Information Security
2015
Alice and Bob Learn Application Security Alice and Bob Learn Application Security
2020
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002) CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002)
2020
Threat Modeling Threat Modeling
2014
Assessing Information Security Assessing Information Security
2010