Explore the impact of interconnected software supply chains on cybersecurity! Can software supply chains be secure? A team of dedicated professionals offers a fresh perspective on your organization's security. You'll get acquainted with a variety of topics: from the history of...
the transparency movement in software to approaches for specification and validation in the rapidly evolving software landscape. The authors introduce us to the main attack vectors, such as mobile and social networks, banking systems, retail systems, and even critical infrastructures, as well as the protective systems we all rely on. You will learn how to defend against threats and gain practical recommendations for both software consumers and providers. "Transparent Software" is a valuable source of knowledge for cybersecurity and application security professionals, as well as for those working in the field of industrial control system security, cloud security, mobile security, DevOps, and DevSecOps. 5 reasons to read: Embedded software. Cloud and other external APIs. Industrial control systems. Internet of Things connected devices. Mobile device software.
Explore the impact of interconnected software supply chains on cybersecurity! Can software supply chains be secure? A team of dedicated professionals offers a fresh perspective on your organization's security. You'll get acquainted with a variety of topics: from the history of the transparency movement in software to approaches for specification and validation in the rapidly evolving software landscape. The authors introduce us to the main attack vectors, such as mobile and social networks, banking systems, retail systems, and even critical infrastructures, as well as the protective systems we all rely on. You will learn how to defend against threats and gain practical recommendations for both software consumers and providers. "Transparent Software" is a valuable source of knowledge for cybersecurity and application security professionals, as well as for those working in the field of industrial control system security, cloud security, mobile security, DevOps, and DevSecOps.
5 reasons to read:
Embedded software.
Cloud and other external APIs.
Industrial control systems.
Internet of Things connected devices.
Mobile device software.
In stock
€ 39.99
Will be delivered to United States on 10 March (Tu):
By courier
from
€ 38.94
In stock
€ 39.99
Will be delivered to United States on 10 March (Tu):
Be the first to know about our current discounts, offers and new products!
Check icon
You have added to your basket
Check icon
You have added to favourites
Sold out
The item is currently out of stock.
In stock
Available in warehouse. You will receive the exact delivery date from the operator after the order confirmation.
To order
The product is delivered directly from the publisher. The order processing time is up to 14 days, you will receive the exact delivery date from the operator after the order confirmation.