Description
Details
Are you an organization using agile software development methodology but struggling to integrate it with traditional security management techniques? Look no further! Our book, "Agile Application Security: Enabling Security in a Continuous Delivery Pipeline," is here to bridge the gap between agile and security.
With contributions from experienced security experts and agile veterans, this practical guide introduces security principles to agile practitioners and vice versa. We understand the problems that arise when agile meets security, and we provide proven solutions to overcome them.
Our book will enlighten you on how to add security practices to each stage of your existing development lifecycle, integrate security with planning, requirements, design, and code, and ensure security testing is an integral part of your team's efforts to deliver working software in each release. It also offers guidance on implementing regulatory compliance in an agile or DevOps environment.
Don't miss out on the opportunity to build an effective security program through a culture of empathy, openness, transparency, and collaboration. Get your hands on "Agile Application Security: Enabling Security in a Continuous Delivery Pipeline" today!
Discover More Best Sellers in Security & Encryption
Shop Security & Encryption
The Joy of Cryptography: An Undergraduate Course in Provable Security
Security & Encryption - The Joy of Cryptography: An Undergraduate Course in Provable Security
Black Hat Go: Go Programming For Hackers and Pentesters
Security & Encryption - Black Hat Go: Go Programming For Hackers and Pentesters
Security & Encryption - Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems
Security & Encryption - Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition
Network Security Assessment: Know Your Network
Security & Encryption - Network Security Assessment: Know Your Network
Cybersecurity Fundamentals: Best Security Practices (cybersecurity beginner)
Security & Encryption - Cybersecurity Fundamentals: Best Security Practices (cybersecurity beginner)
Hacking Connected Cars: Tactics, Techniques, and Procedures
Security & Encryption - Hacking Connected Cars: Tactics, Techniques, and Procedures



