Get Free Shipping on orders over $79
Software Supply Chain Security : Securing the End-to-End Supply Chain for Software, Firmware, and Hardware - Cassie Crossley

Software Supply Chain Security

Securing the End-to-End Supply Chain for Software, Firmware, and Hardware

By: Cassie Crossley

eText | 2 February 2024 | Edition Number 1

At a Glance

eText


$53.89

or 4 interest-free payments of $13.47 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.

This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware.

With this book, you'll learn how to:

  • Pinpoint the cybersecurity risks in each part of your organization's software supply chain
  • Identify the roles that participate in the supply chain—including IT, development, operations, manufacturing, and procurement
  • Design initiatives and controls for each part of the supply chain using existing frameworks and references
  • Implement secure development lifecycle, source code security, software build management, and software transparency practices
  • Evaluate third-party risk in your supply chain
on
Desktop
Tablet
Mobile

More in Network Security

Network Security : A Systems Approach - Larry L Peterson

eBOOK

Cyberethics 8E - Richard A. Spinello

eTEXT

$83.67