The DevSecOps Playbook : (Record no. 7887)

MARC details
000 -LEADER
fixed length control field 01801nam a22001815i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251224142129.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230809s2023 inu 000 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781394169795
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781394169818
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number MacD
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Mack, Sean D
245 14 - TITLE STATEMENT
Title The DevSecOps Playbook :
Remainder of title Deliver Continuous Security at Speed /
Statement of responsibility, etc Sean D Mack
520 ## - SUMMARY, ETC.
Summary, etc A must-read guide to a new and rapidly growing field in cybersecurity In The DevSecOps Playbook: Deliver Continuous Security at Speed, Wiley CISO and CIO Sean D. Mack delivers an expert analysis of how to keep your business secure, relying on the classic triad of people, process, and technology to examine--in depth--every component of DevSecOps. In the book, you'll learn why DevSecOps is as much about people and collaboration as it is about technology and how it impacts every part of our cybersecurity systems. You'll explore the shared responsibility model at the core of DevSecOps, as well as the people, processes, and technology at the heart of the framework. You'll also find: An insightful overview of DevOps and DevSecOps principles and practices Strategies for shifting security considerations to the front-end of the development cycle Ways that the standard security model has evolved over the years and how it has impacted our approach to cybersecurity A need-to-read resource for security leaders, security engineers, and privacy practitioners across all industries, The DevSecOps Playbook will also benefit governance, risk, and compliance specialists who seek to better understand how a transformed approach to cybersecurity can impact their business for the better.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer programming
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10680117
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books
Holdings
Withdrawn status Lost status Damaged status Home library Current library Date acquired Full call number Accession Number Bill Date/Price effective from Koha item type
      Indian Institute of Technology Tirupati Indian Institute of Technology Tirupati 24/12/2025 005.8 MacD EB00816 24/12/2025 E-Books