Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Buy

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and intrusion
  • Explore solutions to infrastructure security using DevOps principles

Book Description

DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization’s security at every level, rather than just focusing on protecting your infrastructure.

This guide combines DevOps and security to help you to protect cloud services, and teaches you how to use techniques to integrate security directly in your product. You will learn how to implement security at every layer, such as for the web application, cloud infrastructure, communication, and the delivery pipeline layers. With the help of practical examples, you’ll explore the core security aspects, such as blocking attacks, fraud detection, cloud forensics, and incident response. In the concluding chapters, you will cover topics on extending DevOps security, such as risk assessment, threat modeling, and continuous security.

By the end of this book, you will be well-versed in implementing security in all layers of your organization and be confident in monitoring and blocking attacks throughout your cloud services.

What you will learn

  • Understand DevSecOps culture and organization
  • Learn security requirements, management, and metrics
  • Secure your architecture design by looking at threat modeling, coding tools and practices
  • Handle most common security issues and explore black and white-box testing tools and practices
  • Work with security monitoring toolkits and online fraud detection rules
  • Explore GDPR and PII handling case studies to understand the DevSecOps lifecycle

Who this book is for

Hands-On Security in DevOps is for system administrators, security consultants, and DevOps engineers who want to secure their entire organization. Basic understanding of Cloud computing, automation frameworks, and programming is necessary.

Table of Contents

  1. DevSecOps Drivers and Challenges
  2. Security Goal and Metrics
  3. Security Assurance Program and Organization
  4. Security Requirements and Compliance
  5. Case Study: Security Assurance Program
  6. Security Architecture, Common Modules Framework, Design Principles
  7. Threat modeling Practices & Secure Design
  8. Secure Coding Baseline, Tools and Best Practices
  9. Case Study: Continuous releases with security by default
  10. Security Testing Plan and Cases
  11. WhiteBox Testing Tips
  12. Security Testing toolkits
  13. Automation - Key to built-in security CI pipeline
  14. Incident Response
  15. Security Monitoring
  16. Security Scanning for new Releases releases
  17. Threat Inspection and Intelligence
  18. Business Fraud, Accounts and Services Abuses detection
  19. GDPR compliance case study
  20. DevSecOps Challenges, Tips and FAQ
(HTML tags aren't allowed.)

Signal Processing in Radar Systems
Signal Processing in Radar Systems

An essential task in radar systems is to find an appropriate solution to the problems related to robust signal processing and the definition of signal parameters. Signal Processing in Radar Systems addresses robust signal processing problems in complex radar systems and digital signal processing subsystems. It also tackles...

Coding Theory: Algorithms, Architectures and Applications
Coding Theory: Algorithms, Architectures and Applications
One of the most important key technologies for digital communication systems as well as storage media is coding theory. It provides a means to transmit information across time and space over noisy and unreliable communication channels.

Coding Theory: Algorithms, Architectures and Applications provides a concise overview...

A Culture of Purpose: How to Choose the Right People and Make the Right People Choose You
A Culture of Purpose: How to Choose the Right People and Make the Right People Choose You

How innovative leaders create meaningful cultures that attract and retain top talent

Building a culture of purpose is one of the greatest challenges facing modern leaders, as today's best minds are looking for meaning, not just jobs. More than any other single factor, cultures of purpose power winning organizations,...


Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Analog Electronics
Analog Electronics
Ian Hickman is looked to by thousands of circuit designers for his innovative design ideas and clear explanations of the fundamentals of analog circuit design. This book is a distillation of Hickman's design insights, introducing all the main areas of analog electronics.

THE professional text for analog electronics
Includes numerous
...
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy