Academic literature on the topic 'CD Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CD Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CD Security"

1

Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Malipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.

Full text
Abstract:
As organizations increasingly adopt containerized applications and Continuous Integration/Continuous Deployment (CI/CD) pipelines, managing and securing secrets becomes critical to maintaining robust security. CI/CD pipelines are critical to modern software development, enabling rapid delivery of software updates. However, these pipelines often handle sensitive secrets such as credentials, API keys, and tokens, making them an attractive target for adversaries. This paper explores two distinct approaches to secrets management in DevOps environments: agent- based solutions, such as CyberArk Cred
APA, Harvard, Vancouver, ISO, and other styles
3

Researcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.

Full text
Abstract:
This comprehensive article explores the critical challenge of securing Continuous Integration and Continuous Deployment (CI/CD) pipelines in modern software development. It addresses the common security threats faced by organizations, including credential leaks, supply chain attacks, and unauthorized access, while offering actionable strategies to mitigate these risks. The paper delves into best practices for enhancing CI/CD security, covering crucial aspects such as secret management, encryption techniques, secure CI/CD tools, immutable infrastructure, and comprehensive security testing metho
APA, Harvard, Vancouver, ISO, and other styles
4

Ravi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.

Full text
Abstract:
As software has become deployed more rapidly in the current fast pace of software development, security has become important, particularly in cloud-native environments where CI/CD pipelines play an important role in operations. Many ways we use to secure traditional systems do not keep up with the fluidity and the fact that they are automated in modern DevOps workflows. As a result, DevSecOps—combining security with the DevOps process—has become the key strategy to maintain the software's security while retaining speed and agility. This article discusses how security automation can
APA, Harvard, Vancouver, ISO, and other styles
5

Ho-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.

Full text
Abstract:
Continuous Integration (CI) and Continuous Deployment (CD) are important aspects in software engineering today. In modern software production organizational models, CI/CD pipeline has become a mandatory element to improve speed and reduce team effort in developing, integrating, and deploying. In the context of increasing information security risks, deploying security tools for the CI/CD pipeline has become an inevitable trend. Deploying information security tools throughout the pipeline according to the "Shift Left" philosophy will help detect information security issues early for timely handl
APA, Harvard, Vancouver, ISO, and other styles
6

Sumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.

Full text
Abstract:
Zero Trust architecture represents a fundamental shift in securing cloud infrastructure, particularly within CI/CD pipelines where traditional perimeter-based security approaches increasingly fail against sophisticated threats. This technical article explores how implementing Zero Trust principles—"never trust, always verify"—creates robust protection throughout the software delivery lifecycle. The implementation spans across multiple dimensions: securing modern CI/CD tools including GitHub Actions, Azure DevOps, and GitLab; establishing comprehensive identity and access management with just-i
APA, Harvard, Vancouver, ISO, and other styles
7

Ponaka, Kamalakar Reddy. "Shift-left approach for Vulnerability Management in SDLC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem9417.

Full text
Abstract:
Security vulnerabilities in software development can lead to severe risks if not addressed promptly. By adopting a shift-left approach and implementing gating mechanisms in Continuous Integration/Continuous Delivery (CI/CD) pipelines, organizations can mitigate the impact of high and critical vulnerabilities early in the Software Development Life Cycle (SDLC). This paper discusses a practical methodology for integrating security gates into the CI/CD pipeline to prevent the release of software with critical security flaws. Keywords —Vulnerability Management, Shift-Left Security, CI/CD Pipeline,
APA, Harvard, Vancouver, ISO, and other styles
8

Tipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Satya Praveen Kumar, Naga. "Integrating Dynamic Security Testing Tools into CI/CD Pipelines: A Continuous Security Testing Case Study." International Journal of Science and Research (IJSR) 10, no. 4 (2021): 1403–5. http://dx.doi.org/10.21275/sr24615152732.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ponaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.

Full text
Abstract:
This paper discusses a systematic approach to integrating Static Application Security Testing (SAST), Software Composition Analysis (SCA), Code Coverage, and Code Quality Checks into Continuous Integration/Continuous Delivery (CI/CD) pipelines. Modern CI/CD pipelines accelerate software delivery but introduce significant security and quality challenges. By incorporating SAST and SCA for security testing, along with code coverage and quality checks, organizations can prevent code vulnerabilities and ensure the maintainability and reliability of their applications. This approach helps developmen
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "CD Security"

1

Raižys, Artūras. "Duomenų apsaugos metodai CD/DVD laikmenoms." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_114615-63291.

Full text
Abstract:
Šiandieniniame pasaulyje duomenys yra viena vertingiausių prekių. Svarbių ar slaptų duomenų praradimai gali padaryti didelę materialinę žalą. Duomenų apsaugos priemonėms yra išleidžiamos milžiniškos pinigų sumos. Darbo metu analizuojami esami duomenų apsaugos įrankiai ir metodai, gilinantis į duomenų apsaugą pernešamose laikmenose, CD ir DVD diskuose. Analizės metu surinkti duomenys apie duomenų apsaugą nuo kopijavimo ir peržiūrėjimo bei panaudojimo naudojami eksperimente siekiant nustatyti tinkamiausius metodus būsimai programinei įrangai, skirtai duomenims apsaugoti. Vykdant eksperimentą sie
APA, Harvard, Vancouver, ISO, and other styles
2

Persson, Simone. "List of Security Concerns within Continuous Software Evolution." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254881.

Full text
Abstract:
The amount of data being collected is increasing astronomically. Hence questions about privacy and data security are becoming more important than ever. A fast-changing culture is also reflected in the demands and requirements placed on software systems. Products and services need to evolve with the demands and feedback from customers to stay relevant on the market. Working methods and technologies have been refined to afford updating software continuously. However, rapidly changing software cause concern for the quality and level of security in the release. This thesis is a comprehensive lite
APA, Harvard, Vancouver, ISO, and other styles
3

Moriconi, Florent. "Amélioration du cycle de développement logiciel via des approches basées sur les données." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS164.

Full text
Abstract:
Cette thèse explore les approches basées sur les données pour l'analyse automatique des causes profondes des échecs de construction dans les systèmes d'intégration continue et de déploiement continu (CI/CD), en se concentrant sur l'identification des échecs non déterministes, la localisation des messages de cause profonde dans les journaux de construction, et la caractérisation de la performance et de la sécurité des systèmes CI/CD. Basée sur des ensembles de données publics et industriels, nous explorons les propriétés des flux de travail CI/CD, telles que les temps d'exécution et les modèles
APA, Harvard, Vancouver, ISO, and other styles
4

Arnold, Brose, Kupfer, et al. "Mitteilungen des URZ 3/2004." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brás, André Emanuel Raínho. "Container security in CI/CD pipelines." Master's thesis, 2021. http://hdl.handle.net/10773/31292.

Full text
Abstract:
The rising of the DevOps movement and the transition from a product economy to a service economy drove significant changes in the software development life cycle paradigm, among which the dropping of the waterfall in favor of agile methods. Since DevOps is itself an agile method, it allows us to monitor current releases, receiving constant feedback from clients, and improving the next software releases. Despite its extraordinary development, DevOps still presents limitations concerning security, which needs to be included in the Continuous Integration or Continuous Deployment pipelines
APA, Harvard, Vancouver, ISO, and other styles
6

Zhygulskyy, Mykyta. "AUTOMATED, SCHEDULED AND CI /CD WEB INJECTION." Master's thesis, 2021. http://hdl.handle.net/10400.8/5786.

Full text
Abstract:
This report is made within the Curricular Unit (UC) Project, in the 2nd year of the Master in Cyber-security and Forensic Informatics (MCIF) provided by the Polytechnic Institute of Leiria (IPL). The purpose of this project is to study SQL Injection vulnerabilities in web applications. According to OWASP (Open Web Application Security Project) [20][19], this is one of the more prevalent attacks on web applications. As part of this work a web application was implemented, which can from a URL address, go through all the endpoints of the target application and test for SQL Injection vulner
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "CD Security"

1

United States. Federal Trade Commission., ed. Business Briefcase, Now With Information Security Guide, (CD-ROM). s.n., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dulaney, Emmett A. CompTIA Security+TM Study Guide. John Wiley & Sons, Ltd., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jörn, Mothes, ed. Beschädigte Seelen: DDR-Jugend und Staatssicherheit : mit 136 Dokumenten und einer Audi-CD mit Original-Tonunterlagen. Edition Temmen, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spafford. Security Companion CD. O'Reilly Media, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dcd2, Master Carton 1000 Acscot. Cd/Cd-Rom Tattle Tape Security Strips. SCOTCH BLANK TAPE, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Media, Syngress. The Ultimate Techno Security CD. Syngress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rogers, Russ, and Susan Snedaker. Managing IT Security Ultimate CD. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wolfe, Paul. CompTIA Security + VTC Training CD. Virtual Training Company Inc, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rogers, Russ, and Susan Snedaker. Managing IT Security Ultimate CD. Elsevier Science & Technology Books, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brad Causey & Bobby Rogers. Linux Security VTC Training CD. Virtual Training Company, Inc., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "CD Security"

1

Dingare, Pranoday Pramod. "Managing Security with Jenkins." In CI/CD Pipeline Using Jenkins Unleashed. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moelyaningrum, Anita Dewi. "The Potential of Cacao Pod Rind Waste (Theobroma cacao) to Adsorb Heavy Metal (Pb and Cd) in Water." In Sustainable Future for Human Security. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5433-4_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Froehlich, Annette, Vincent Seffinga, and Ruiyan Qiu. "Initial Mandates of the Committee on the Peaceful Uses of Outer Space (COPUOS) and the Conference on Disarmament (CD)." In The United Nations and Space Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06025-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kuvendziev, Stefan, Mirko Marinkovski, Kiril Lisichkov, and Perica Paunović. "Artificial Neural Network Modeling of Cd(II) Ions Adsorption on Nano-porous Inorganic Sorbents." In Nanoscience Advances in CBRN Agents Detection, Information and Energy Security. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-9697-2_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smulders, Marinus J. M., Luud J. W. J. Gilissen, Martina Juranić, Jan G. Schaart, and Clemens C. M. van de Wiel. "Gene Editing of Wheat to Reduce Coeliac Disease Epitopes in Gluten." In A Roadmap for Plant Genome Editing. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-46150-7_13.

Full text
Abstract:
AbstractBy using gene editing technologies such as CRISPR/Cas, precise modifications can be made in the genome. CRISPR/Cas is especially valuable for targeted mutagenesis in polyploids, as it can induce mutations of multiple alleles simultaneously, to obtain regenerants that are homozygous for the desired mutation. A range of gene-edited traits have been developed in hexaploid bread wheat, including various nutrition and health-related traits, plant architecture, pest and disease resistance, tolerance to abiotic stress, and traits that enable more efficient breeding. Wheat is also known as a c
APA, Harvard, Vancouver, ISO, and other styles
6

Froehlich, Annette, Vincent Seffinga, and Ruiyan Qiu. "The Development of the Mandates of the Committee on the Peaceful Uses of Outer Space (COPUOS) and the Conference on Disarmament (CD) and the Collaboration Between the Forums." In The United Nations and Space Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06025-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dakic, Vedran, Jasmin Redzepagic, and Matej Basic. "CI/CD Toolset Security." In DAAAM Proceedings. DAAAM International Vienna, 2022. http://dx.doi.org/10.2507/33rd.daaam.proceedings.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bowman, Gerald, Ben Rothke, Christopher Steinke, et al. "Physical Security." In Information Security Management Handbook on CD-ROM, 2006 Edition. Auerbach Publications, 2006. http://dx.doi.org/10.1201/noe0849385858.ch10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Herrmann, Debra, Ben Rothke, Robert Slade, et al. "Outsourcing Security." In Information Security Management Handbook on CD-ROM, 2006 Edition. Auerbach Publications, 2006. http://dx.doi.org/10.1201/noe0849385858.ch3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Silberschatz, Avi, Henry Korth, S. Sudarshan, et al. "Database Security and Privacy." In Computer Science Handbook, Second Edition CD-ROM. CRC Press, 2004. http://dx.doi.org/10.1201/9780203494455.sec6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CD Security"

1

Afifah, Angelita Salsabila, Herman Kabetta, I. Komang Setia Buana, and Hermawan Setiawan. "Code Obfuscation in CI/CD Pipelines for Enhanced DevOps Security." In 2024 International Conference on Artificial Intelligence, Blockchain, Cloud Computing, and Data Analytics (ICoABCD). IEEE, 2024. http://dx.doi.org/10.1109/icoabcd63526.2024.10704536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saleh, Sabbir, Nazim Madhavji, and John Steinbacher. "Towards a Blockchain-Based CI/CD Framework to Enhance Security in Cloud Environments." In 20th International Conference on Evaluation of Novel Approaches to Software Engineering. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013298200003928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meliala, Rehmia, Charles Lim, and Joseph Andreas. "Integrating Security Testing in CI/CD Pipelines: Current Trends from Literature and Market." In 2024 Ninth International Conference on Informatics and Computing (ICIC). IEEE, 2024. https://doi.org/10.1109/icic64337.2024.10957011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheenepalli, Jayaprakashreddy, John D. Hastings, Khandaker Mamun Ahmed, and Chad Fenner. "Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gugueoth, Vinay Kumar. "Enhanced Security Attack Detection and Prevention in 5G Networks Using CD-GELU-CNN and FMLRQC with HDFS-ECH-KMEANS." In 2024 8th International Conference on Computer, Software and Modeling (ICCSM). IEEE, 2024. http://dx.doi.org/10.1109/iccsm63823.2024.00015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bi, Chuanxue, and Nenad Jukic. "A security paradigm for Web databases." In the 37th annual Southeast regional conference (CD-ROM). ACM Press, 1999. http://dx.doi.org/10.1145/306363.306420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dixson, Ronald, Boon Ping Ng, Craig D. McGray, Ndubuisi G. Orji, and Jon Geist. "Progress on CD-AFM tip width calibration standards." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.921597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Haigh, Mary K., Geoffrey R. Nash, Neil T. Gordon, et al. "Progress in negative luminescent Hg 1-x Cd x Te diode arrays." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2005. http://dx.doi.org/10.1117/12.603292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chekanova, Galina V., Ivan Y. Lartsev, Mikhail S. Nikitin, et al. "LWIR and VLWIR Hg 1-x Cd x Te photoconductors with improved responsivity." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.542056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Villanger, Asta, Trond Brudevoll, and Knut Stenersen. "IR laser induced heating in Hg 0.72 Cd 0.28 Te." In Optics/Photonics in Security and Defence, edited by David H. Titterton. SPIE, 2006. http://dx.doi.org/10.1117/12.689696.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "CD Security"

1

D'Onofrio, Dominic. CI/CD Pipeline and DevSecOps Integration for Security and Load Testing. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2430395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chandramouli, Ramaswamy. Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sebban, Fanny, James Revill, Johanna Kleffmann, Renata Hessmann Dalaqua, and Vivienne Zhang. Revitalizing the Conference on Disarmament: Workshop Report. The United Nations Institute for Disarmament Research, 2023. http://dx.doi.org/10.37559/wmd/23/cd-retreat.

Full text
Abstract:
The Conference on Disarmament (CD) has played a significant role in the negotiation of several major multilateral agreements that continue to contribute to global peace and security. More recently, however, negotiation in the CD has reached an impasse, leaving it unable to make progress on its agenda at a point of growing geopolitical tension. To address this issue, the United Nations Institute for Disarmament Research (UNIDIR), with the support of France and Germany, organized a high-level retreat in Montreux, Switzerland, on 22–23 June 2023 to discuss ideas to revitalize the work of the CD a
APA, Harvard, Vancouver, ISO, and other styles
4

Sebban, Fanny, James Revill, Johanna Kleffmann, Renata Hessmann Dalaqua, and Vivienne Zhang. Revitalizing the Conference on Disarmament: Workshop Report. The United Nations Institute for Disarmament Research, 2023. http://dx.doi.org/10.37559/wmd/23/cd-retreat.

Full text
Abstract:
The Conference on Disarmament (CD) has played a significant role in the negotiation of several major multilateral agreements that continue to contribute to global peace and security. More recently, however, negotiation in the CD has reached an impasse, leaving it unable to make progress on its agenda at a point of growing geopolitical tension. To address this issue, the United Nations Institute for Disarmament Research (UNIDIR), with the support of France and Germany, organized a high-level retreat in Montreux, Switzerland, on 22–23 June 2023 to discuss ideas to revitalize the work of the CD a
APA, Harvard, Vancouver, ISO, and other styles
5

Hendrick, Stephen, and Martin Mckeay. Addressing Cybersecurity Challenges in Open Source Software. The Linux Foundation, 2022. https://doi.org/10.70828/jxey9389.

Full text
Abstract:
While open source software is ubiquitous and generally regarded as being secure, software development practices vary widely across projects regarding application development practices, protocols to respond to defects, or lack of standardized selection criteria to determine which software components are more likely to be secure. Consequently, software supply chains are vulnerable to attack, with implications and challenges for open source project communities. To help improve the state of software supply chain security, new research was conducted in partnership with the Open Source Security Foun
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!