𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware

✍ Scribed by Cassie Crossley


Publisher
O'Reilly Media
Tongue
English
Leaves
200
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.

This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.

With this book, you'll learn how to:

  • Pinpoint the cybersecurity risks in each part of your organization's software supply chain
  • Find the cybersecurity frameworks and resources that can improve security
  • Identify the roles that participate in the supply chainβ€”including IT, development, operations, manufacturing, and procurement
  • Design initiatives and controls for each part of the supply chain using existing frameworks and references
  • Evaluate third-party risk in your supply chain

πŸ“œ SIMILAR VOLUMES


Software Supply Chain Security: Securing
✍ Cassie Crossley πŸ“‚ Library πŸ“… 2024 πŸ› Oreilly & Associates Inc 🌐 English

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, a

Software Supply Chain Security: Securing
✍ Cassie Crossley πŸ“‚ Library πŸ“… 2024 πŸ› O'Reilly Media 🌐 English

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, a

Software Supply Chain Security (First Ea
✍ Cassie Crossley πŸ“‚ Library πŸ“… 2023 πŸ› O'Reilly Media, Inc. 🌐 English

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, a

IoT Supply Chain Security Risk Analysis
✍ Timothy Kieras, Junaid Farooq, Quanyan Zhu πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement i

IoT Supply Chain Security Risk Analysis
✍ Timothy Kieras, Junaid Farooq, Quanyan Zhu πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement i