Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

CyberSecurity in a DevOps Environment

Best Price (Coupon Required):
Buy CyberSecurity in a DevOps Environment for $134.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $149.00 - $149.00
BEST PRICE

Single Product Purchase

$134.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$149.00 $149.00

10% OFF
This deals requires coupon
$134.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031422119
Condition
New
Product Description

This book provides an overview of software security analysis in a DevOps cycle including requirements formalisation, verification and continuous monitoring. It presents an overview of the latest techniques and tools that help engineers and developers verify the security requirements of large-scale industrial systems and explains novel methods that enable a faster feedback loop for verifying security-related activities, which rely on techniques such as automated testing, model checking, static analysis, runtime monitoring, and formal methods. The book consists of three parts, each covering a different aspect of security engineering in the DevOps context. The first part, "Security Requirements", explains how to specify and analyse security issues in a formal way. The second part, "Prevention at Development Time", offers a practical and industrial perspective on how to design, develop and verify secure applications. The third part, "Protection at Operations", eventually introduces tools for continuous monitoring of security events and incidents. Overall, it covers several advanced topics related to security verification, such as optimizing security verification activities, automatically creating verifiable specifications from security requirements and vulnerabilities, and using these security specifications to verify security properties against design specifications and generate artifacts such as tests or monitors that can be used later in the DevOps process. The book aims at computer engineers in general and does not require specific knowledge. In particular, it is intended for software architects, developers, testers, security professionals, and tool providers, who want to define, build, test, and verify secure applications, Web services, and industrial systems.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

A Posteriori Error Analysis Via Duality Theory

A Posteriori Error Analysis Via Duality Theory

$84.99
Law and Reflexive Politics

Law and Reflexive Politics

$219.99
Logic, Language and Reasoning

Logic, Language and Reasoning

$39.99
Theologen

Theologen

$17.99
China and the Belt and Road Initiative

China and the Belt and Road Initiative

$169.99
Studies in Memory of Issai Schur

Studies in Memory of Issai Schur

$109.99
The Sacralization of Time

The Sacralization of Time

$54.99
City Policies and the European Urban Agenda

City Policies and the European Urban Agenda

$129.99
Instability of Continuous Systems

Instability of Continuous Systems

$84.99
Topographies of Caribbean Writing, Race, and the British Countryside

Topographies of Caribbean Writing, Race, and the British Countryside

$64.99
Umgang mit Feedback im Kontext Schule

Umgang mit Feedback im Kontext Schule

$39.99
The Catholic Church and Politics in Nicaragua and Costa Rica

The Catholic Church and Politics in Nicaragua and Costa Rica

$109.99
The Practice of Surgical Pathology

The Practice of Surgical Pathology

$139.99
Testing Quantum Theory with Higher-Order Interference in Many-Particle Correlations

Testing Quantum Theory with Higher-Order Interference in Many-Particle Correlations

$179.99
Die Kraft weiblicher Archetypen

Die Kraft weiblicher Archetypen

$24.99
Creative Education, Teaching and Learning

Creative Education, Teaching and Learning

$89.00
Shallow Water Waves on the Rotating Earth

Shallow Water Waves on the Rotating Earth

$54.99
Passionate Deliberation

Passionate Deliberation

$84.99
Messen Steuern Regeln

Messen Steuern Regeln

$64.99
Frontiers of Combining Systems

Frontiers of Combining Systems

$54.99
Insights from Comparative Hearing Research

Insights from Comparative Hearing Research

$169.99
Question Answering over Text and Knowledge Base

Question Answering over Text and Knowledge Base

$179.99
Dynamische Visualisierung

Dynamische Visualisierung

$109.00
Wirtschaftsinformatik 95

Wirtschaftsinformatik 95

$54.99
Integrated Optics

Integrated Optics

$39.99
Network and System Security

Network and System Security

$54.99
Shermans March and the Emergence of the Independent Black Church Movement: From Atlanta to the Sea

Shermans March and the Emergence of the Independent Black Church Movement: From Atlanta to the Sea

$54.99
Biokonomie und Zirkulrwirtschaft im Bauwesen

Biokonomie und Zirkulrwirtschaft im Bauwesen

$49.99
Rangeland Systems

Rangeland Systems

$59.99
Mango, abuela y yo

Mango, abuela y yo

$4.49
Die Bewetterung chemisch modifizierter Wollgarne

Die Bewetterung chemisch modifizierter Wollgarne

$54.99
Social Goal-Objective Formation, Democracy and National Interest

Social Goal-Objective Formation, Democracy and National Interest

$129.00
Sustainability Analysis

Sustainability Analysis

$84.99
Formation organisationspdagogischer Erkenntnis

Formation organisationspdagogischer Erkenntnis

$69.99
Families in an Era of Increasing Inequality

Families in an Era of Increasing Inequality

$139.99
Contesting Chineseness

Contesting Chineseness

$119.00
Goosebumps SlappyWorld: The Ghost of Slappy (#6)

Goosebumps SlappyWorld: The Ghost of Slappy (#6)

$5.99
Studies in Complexity and Cryptography

Studies in Complexity and Cryptography

$79.99
Robust Control for Discrete-Time Markovian Jump Systems in the Finite-Time Domain

Robust Control for Discrete-Time Markovian Jump Systems in the Finite-Time Domain

$109.00
Riesen des Meeres

Riesen des Meeres

$49.99
previous
next