Identity Security for Software Development: Best Practices That Every Developer Must Know
By John Walsh, Uzi Ailon, and Matt Barker
Read by Tom Perkins
-
3 Formats: Digital Download
-
3 Formats: CD
-
3 Formats: MP3 CD
-
Regular Price: $19.99
Special Price $15.99
or 1 CreditISBN: 9781663755773
$12.99 With Membership: Learn More -
Regular Price: $39.99
Special Price $25.99
ISBN: 9798228630291
In Stock ● Ships in 1-2 days
-
Regular Price: $45.95
Special Price $29.87
ISBN: 9798228630307
In Stock ● Ships in 1-2 days
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help. In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn: ● What developers need to know about managing secrets and identity to build safer apps ● What machine identities, secrets, and credentials are—and how to secure them ● How to secure the software supply chain to build safer apps ● How identity security fits into modern software development practices
Learn More- Only $12.99/month gets you 1 Credit/month
- Cancel anytime
- Hate a book? Then we do too, and we'll exchange it.
Summary
Summary
Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:
● What developers need to know about managing secrets and identity to build safer apps
● What machine identities, secrets, and credentials are—and how to secure them
● How to secure the software supply chain to build safer apps
● How identity security fits into modern software development practices
Details
Details
Available Formats : | Digital Download, CD, MP3 CD |
Category: | Nonfiction/Technology & Engineering |
Runtime: | 7.77 |
Audience: | Adult |
Language: | English |
To listen to this title you will need our latest app
Due to publishing rights this title requires DRM and can only be listened to in the Downpour app