Journal articles on the topic 'CD Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'CD Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.
Full textMalipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.
Full textResearcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.
Full textRavi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.
Full textHo-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Full textSumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.
Full textPonaka, Kamalakar Reddy. "Shift-left approach for Vulnerability Management in SDLC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem9417.
Full textTipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.
Full textSatya Praveen Kumar, Naga. "Integrating Dynamic Security Testing Tools into CI/CD Pipelines: A Continuous Security Testing Case Study." International Journal of Science and Research (IJSR) 10, no. 4 (2021): 1403–5. http://dx.doi.org/10.21275/sr24615152732.
Full textPonaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.
Full textDevashish Ghanshyambhai Patel. "Enhancing CI/CD security with provenance metadata and supply chain best practices." World Journal of Advanced Engineering Technology and Sciences 16, no. 1 (2025): 019–32. https://doi.org/10.30574/wjaets.2025.16.1.1181.
Full textSamuel Jesupelumi Owoade, Abel Uzoka, Joshua Idowu Akerele, and Pascal Ugochukwu Ojukwu. "Cloud-based compliance and data security solutions in financial applications using CI/CD pipelines." World Journal of Engineering and Technology Research 3, no. 2 (2024): 011–21. http://dx.doi.org/10.53346/wjetr.2024.3.2.0059.
Full textRohith Aitharaju. "Policy-driven infrastructure hardening using CI/CD pipelines in enterprise environments." International Journal of Science and Research Archive 7, no. 1 (2022): 591–602. https://doi.org/10.30574/ijsra.2022.7.1.0280.
Full textAkilnath, Bodipudi. "Integrating Vulnerability Scanning with Continuous Integration/Continuous Deployment (CI/CD) Pipelines." European Journal of Advances in Engineering and Technology 9, no. 2 (2022): 49–55. https://doi.org/10.5281/zenodo.13622978.
Full textYang, Shuai. "The Impact of Continuous Integration and Continuous Delivery on Software Development Efficiency." Journal of Computer, Signal, and System Research 2, no. 3 (2025): 59–68. https://doi.org/10.71222/pzvfqm21.
Full textBaladari, Venkata. "End-to-End CI/CD Deployment of RESTful Microservices in the Cloud." International Journal of Core Engineering and Management 6, no. 8 (2020): 262–68. https://doi.org/10.5281/zenodo.15020514.
Full textKamalakar, Reddy Ponaka. "Secure Secret Management in DevOps CI/CD Pipelines." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 73–76. https://doi.org/10.5281/zenodo.13919341.
Full textDachepally, Raju. "Continuous Integration and Continuous Delivery (CI/CD) Pipelines: Best Practices for Modern Enterprises." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 05, no. 10 (2021): 1–8. https://doi.org/10.55041/ijsrem10912.
Full textPalavesam, Kuppusamy Vellamadam, Siva Venkatesh Arcot, Mahesh Vaijainthymala Krishnamoorthy, and Ebishdon G V. "Building Automated Security Pipeline for Containerized Microservices." Journal of Advances in Mathematics and Computer Science 40, no. 2 (2025): 53–66. https://doi.org/10.9734/jamcs/2025/v40i21969.
Full textSarathe Krisshnan Jutoo Vijayaraghavan. "Security as code: Transforming DevSecOps through CI/CD Integration." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 2219–25. https://doi.org/10.30574/wjaets.2025.15.1.0446.
Full textZhao, Li, Fei Juan Wang, Hui Yang, Yu Xing Duan, and Chen Zhu. "Impacts of Nitrogen (Urea) Fertilization on Cadmium Accumulation Nitrate Contents and Nutritive Values in Chinese Cabbage." Advanced Materials Research 393-395 (November 2011): 809–17. http://dx.doi.org/10.4028/www.scientific.net/amr.393-395.809.
Full textWeimer, Katherine H., Laura Lillard, Wendi Arant, and David Mitchell. "Security and Access to CD-ROMs Accompanying Books." Library Resources & Technical Services 44, no. 4 (2000): 201–8. http://dx.doi.org/10.5860/lrts.44n4.201.
Full textBelsky, Jay, and Michael Rovine. "Q-Sort security and first-year nonmaternal care." New Directions for Child and Adolescent Development 1990, no. 49 (1990): 7–22. http://dx.doi.org/10.1002/cd.23219904903.
Full textHu, Ji, and Christoph Meinel. "Tele-Lab “IT-Security” on CD: portable, reliable and safe IT security training." Computers & Security 23, no. 4 (2004): 282–89. http://dx.doi.org/10.1016/j.cose.2004.02.005.
Full textADEDAMOLA ABIODUN SOLANKE. "Enterprise DevSecOps: Integrating security into CI/CD pipelines for regulated industries." World Journal of Advanced Research and Reviews 13, no. 2 (2022): 633–48. https://doi.org/10.30574/wjarr.2022.13.2.0121.
Full textRahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Secure-by-Design CI/CD Pipelines: A Zero Trust Framework for Cloud-Native Deployment Automation." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 211–19. https://doi.org/10.32996/jcsts.2025.7.5.27.
Full textBhosale, Pradeep. "A Comprehensive Guide to Secure Build Pipelines with Continuous Scanning." International Scientific Journal of Engineering and Management 04, no. 01 (2025): 1–6. https://doi.org/10.55041/isjem00438.
Full textXia, Shiwei, Liangyun Song, Yi Wu, et al. "An Integrated LHS–CD Approach for Power System Security Risk Assessment with Consideration of Source–Network and Load Uncertainties." Processes 7, no. 12 (2019): 900. http://dx.doi.org/10.3390/pr7120900.
Full textNardone, Claudia, Simone Russo, Simone Gazzillo, Raffaele Migliorini, Marco Trabucco Aurilio, and Francesco Saverio Mennini. "PP36 Inflammatory Bowel Disease: The Disability Costs Among Italian Workers." International Journal of Technology Assessment in Health Care 35, S1 (2019): 44. http://dx.doi.org/10.1017/s0266462319001995.
Full textRatnangi, Nirek. "Challenges and Solutions for Implementing CI/CD Pipelines in Linux-Based Development Frameworks." Journal of Scientific and Engineering Research 6, no. 6 (2019): 229–32. https://doi.org/10.5281/zenodo.13918897.
Full textReddy Pothu, Avinash. "Garlic Gate: Revolutionizing Application Security with Integrated Artificial Intelligence (AI) Across SDLC, CI/CD, and Advanced Methodologies." FMDB Transactions on Sustainable Computing Systems 2, no. 3 (2024): 119–30. https://doi.org/10.69888/ftscs.2024.000259.
Full textZulunov, Ravshanbek Mamatovich. "Security tools in a continuous integration/continuous deployment pipeline." Research and implementation 2, no. 12 (2024): 237–44. https://doi.org/10.5281/zenodo.14557311.
Full textNaga Murali Krishna Koneru. "Integrating Security into CI/CD Pipelines: A DevSecOps Approach with SAST, DAST, and SCA Tools." International Journal of Science and Research Archive 3, no. 1 (2021): 250–65. https://doi.org/10.30574/ijsra.2021.3.1.0080.
Full textAllam, Hitesh. "Security-Driven Pipelines: Embedding DevSecOps into CI/CD Workflows." International Journal of Emerging Trends in Computer Science and Information Technology 3, no. 1 (2022): 86–97. https://doi.org/10.63282/3050-9246.ijetcsit-v3i1p110.
Full textNikolay, Pavlov. "NATO's Concept Development and Experimentation Approach in the EU's Common Security and Defence Policy? – An Institutional Isomorphism Perspective." Defence Studies 22, no. 2 (2021): 211–30. https://doi.org/10.1080/14702436.2021.2008248.
Full textRahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.
Full textLinsmeier, Thomas J., Gerald J. Lobo, and George K. Kanaan. "Dispersion in Industry Price Changes and the Relative Association between Alternative Income Measures and Security Returns." Journal of Accounting, Auditing & Finance 10, no. 2 (1995): 365–79. http://dx.doi.org/10.1177/0148558x9501000211.
Full textKhattar, Kriti. "Docker Like a Pro: Essential Practices for Secure and Scalable Containers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41900.
Full textZhang, Yingfan, Tingting Fu, Xueyao Chen, Hancheng Guo, Hongyi Li, and Bifeng Hu. "Modeling Cadmium Contents in a Soil–Rice System and Identifying Potential Controls." Land 11, no. 5 (2022): 617. http://dx.doi.org/10.3390/land11050617.
Full textXu, Xinxin, Qingxian Mo, Zebin Cai, Qing Jiang, Danman Zhou, and Jicai Yi. "Promoters, Key Cis-Regulatory Elements, and Their Potential Applications in Regulation of Cadmium (Cd) in Rice." International Journal of Molecular Sciences 25, no. 24 (2024): 13237. https://doi.org/10.3390/ijms252413237.
Full textBondalapati, Rahul Chowdary, and Satish Kumar Malaraju. "Enhancing Secure Deployment Automation in Cloud Environments: A Risk-Driven Approach to CI/CD Pipelines." European Journal of Computer Science and Information Technology 13, no. 38 (2025): 60–75. https://doi.org/10.37745/ejcsit.2013/vol13n386075.
Full textTaiwo Joseph Akinbolaji, Godwin Nzeako, David Akokodaripon, and Akorede Victor Aderoju. "Automation in Cloud-Based DevOps: A Guide to CI/CD Pipelines and Infrastructure as Code (IaC) with Terraform and Jenkins." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 090–104. http://dx.doi.org/10.30574/wjaets.2024.13.2.0542.
Full textDavid Akokodaripon and Godwin Nzeako. "Enhancing data engineering workflows with CI/CD process optimization using terraform: Reducing deployment time and operational overhead." World Journal of Advanced Research and Reviews 19, no. 3 (2023): 1639–46. https://doi.org/10.30574/wjarr.2023.19.3.1795.
Full textBhardwaj, Arvind Kumar, P. K. Dutta, and Pradeep Chintale. "Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines." Babylonian Journal of Networking 2024 (August 20, 2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.
Full textLin, Qi, Qing-Ping Yang, Bin Sun, et al. "Competitive coordination control of the AIE and micro states of supramolecular gel: an efficient approach for reversible dual-channel stimuli-response materials." Soft Matter 10, no. 42 (2014): 8427–32. http://dx.doi.org/10.1039/c4sm01288g.
Full textRida, Abderrahim, and Ayoub Ait Lahcen. "Towards DevSecOps Model for Multi-tier Web Applications." ITM Web of Conferences 69 (2024): 04018. https://doi.org/10.1051/itmconf/20246904018.
Full textSrikanth, Prabhu Muthusamy, and Rama Krishna Inampudi. "Consent-Driven Continuous Delivery with Open Policy Agent and Spinnaker." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 4, no. 2 (2025): 102–12. https://doi.org/10.60087/jklst.v4.n2.009.
Full textYogeswara, Reddy Avuthu. "Balancing Speed and Security in DevOps Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 5, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.14183889.
Full textChirag, Amrutlal Pethad. "Design and Build a CI/CD pipeline for Salesforce." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 136–46. https://doi.org/10.5281/zenodo.13919671.
Full textPochu, Sandeep, Sai Rama Krishna Nersu, and Srikanth Reddy Kathram. "Zero Trust Principles in Cloud Security: A DevOps Perspective." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 6, no. 1 (2024): 660–71. https://doi.org/10.60087/jaigs.v6i1.302.
Full text