Letteratura scientifica selezionata sul tema "CD Security"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "CD Security".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "CD Security"

1

Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Malipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.

Testo completo
Abstract (sommario):
As organizations increasingly adopt containerized applications and Continuous Integration/Continuous Deployment (CI/CD) pipelines, managing and securing secrets becomes critical to maintaining robust security. CI/CD pipelines are critical to modern software development, enabling rapid delivery of software updates. However, these pipelines often handle sensitive secrets such as credentials, API keys, and tokens, making them an attractive target for adversaries. This paper explores two distinct approaches to secrets management in DevOps environments: agent- based solutions, such as CyberArk Cred
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Researcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.

Testo completo
Abstract (sommario):
This comprehensive article explores the critical challenge of securing Continuous Integration and Continuous Deployment (CI/CD) pipelines in modern software development. It addresses the common security threats faced by organizations, including credential leaks, supply chain attacks, and unauthorized access, while offering actionable strategies to mitigate these risks. The paper delves into best practices for enhancing CI/CD security, covering crucial aspects such as secret management, encryption techniques, secure CI/CD tools, immutable infrastructure, and comprehensive security testing metho
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Ravi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.

Testo completo
Abstract (sommario):
As software has become deployed more rapidly in the current fast pace of software development, security has become important, particularly in cloud-native environments where CI/CD pipelines play an important role in operations. Many ways we use to secure traditional systems do not keep up with the fluidity and the fact that they are automated in modern DevOps workflows. As a result, DevSecOps—combining security with the DevOps process—has become the key strategy to maintain the software's security while retaining speed and agility. This article discusses how security automation can
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Ho-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.

Testo completo
Abstract (sommario):
Continuous Integration (CI) and Continuous Deployment (CD) are important aspects in software engineering today. In modern software production organizational models, CI/CD pipeline has become a mandatory element to improve speed and reduce team effort in developing, integrating, and deploying. In the context of increasing information security risks, deploying security tools for the CI/CD pipeline has become an inevitable trend. Deploying information security tools throughout the pipeline according to the "Shift Left" philosophy will help detect information security issues early for timely handl
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.

Testo completo
Abstract (sommario):
Zero Trust architecture represents a fundamental shift in securing cloud infrastructure, particularly within CI/CD pipelines where traditional perimeter-based security approaches increasingly fail against sophisticated threats. This technical article explores how implementing Zero Trust principles—"never trust, always verify"—creates robust protection throughout the software delivery lifecycle. The implementation spans across multiple dimensions: securing modern CI/CD tools including GitHub Actions, Azure DevOps, and GitLab; establishing comprehensive identity and access management with just-i
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Ponaka, Kamalakar Reddy. "Shift-left approach for Vulnerability Management in SDLC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem9417.

Testo completo
Abstract (sommario):
Security vulnerabilities in software development can lead to severe risks if not addressed promptly. By adopting a shift-left approach and implementing gating mechanisms in Continuous Integration/Continuous Delivery (CI/CD) pipelines, organizations can mitigate the impact of high and critical vulnerabilities early in the Software Development Life Cycle (SDLC). This paper discusses a practical methodology for integrating security gates into the CI/CD pipeline to prevent the release of software with critical security flaws. Keywords —Vulnerability Management, Shift-Left Security, CI/CD Pipeline,
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Tipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Satya Praveen Kumar, Naga. "Integrating Dynamic Security Testing Tools into CI/CD Pipelines: A Continuous Security Testing Case Study." International Journal of Science and Research (IJSR) 10, no. 4 (2021): 1403–5. http://dx.doi.org/10.21275/sr24615152732.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Ponaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.

Testo completo
Abstract (sommario):
This paper discusses a systematic approach to integrating Static Application Security Testing (SAST), Software Composition Analysis (SCA), Code Coverage, and Code Quality Checks into Continuous Integration/Continuous Delivery (CI/CD) pipelines. Modern CI/CD pipelines accelerate software delivery but introduce significant security and quality challenges. By incorporating SAST and SCA for security testing, along with code coverage and quality checks, organizations can prevent code vulnerabilities and ensure the maintainability and reliability of their applications. This approach helps developmen
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "CD Security"

1

Raižys, Artūras. "Duomenų apsaugos metodai CD/DVD laikmenoms." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_114615-63291.

Testo completo
Abstract (sommario):
Šiandieniniame pasaulyje duomenys yra viena vertingiausių prekių. Svarbių ar slaptų duomenų praradimai gali padaryti didelę materialinę žalą. Duomenų apsaugos priemonėms yra išleidžiamos milžiniškos pinigų sumos. Darbo metu analizuojami esami duomenų apsaugos įrankiai ir metodai, gilinantis į duomenų apsaugą pernešamose laikmenose, CD ir DVD diskuose. Analizės metu surinkti duomenys apie duomenų apsaugą nuo kopijavimo ir peržiūrėjimo bei panaudojimo naudojami eksperimente siekiant nustatyti tinkamiausius metodus būsimai programinei įrangai, skirtai duomenims apsaugoti. Vykdant eksperimentą sie
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Persson, Simone. "List of Security Concerns within Continuous Software Evolution." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254881.

Testo completo
Abstract (sommario):
The amount of data being collected is increasing astronomically. Hence questions about privacy and data security are becoming more important than ever. A fast-changing culture is also reflected in the demands and requirements placed on software systems. Products and services need to evolve with the demands and feedback from customers to stay relevant on the market. Working methods and technologies have been refined to afford updating software continuously. However, rapidly changing software cause concern for the quality and level of security in the release. This thesis is a comprehensive lite
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Moriconi, Florent. "Amélioration du cycle de développement logiciel via des approches basées sur les données." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS164.

Testo completo
Abstract (sommario):
Cette thèse explore les approches basées sur les données pour l'analyse automatique des causes profondes des échecs de construction dans les systèmes d'intégration continue et de déploiement continu (CI/CD), en se concentrant sur l'identification des échecs non déterministes, la localisation des messages de cause profonde dans les journaux de construction, et la caractérisation de la performance et de la sécurité des systèmes CI/CD. Basée sur des ensembles de données publics et industriels, nous explorons les propriétés des flux de travail CI/CD, telles que les temps d'exécution et les modèles
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Arnold, Brose, Kupfer, et al. "Mitteilungen des URZ 3/2004." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401111.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Brás, André Emanuel Raínho. "Container security in CI/CD pipelines." Master's thesis, 2021. http://hdl.handle.net/10773/31292.

Testo completo
Abstract (sommario):
The rising of the DevOps movement and the transition from a product economy to a service economy drove significant changes in the software development life cycle paradigm, among which the dropping of the waterfall in favor of agile methods. Since DevOps is itself an agile method, it allows us to monitor current releases, receiving constant feedback from clients, and improving the next software releases. Despite its extraordinary development, DevOps still presents limitations concerning security, which needs to be included in the Continuous Integration or Continuous Deployment pipelines
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Zhygulskyy, Mykyta. "AUTOMATED, SCHEDULED AND CI /CD WEB INJECTION." Master's thesis, 2021. http://hdl.handle.net/10400.8/5786.

Testo completo
Abstract (sommario):
This report is made within the Curricular Unit (UC) Project, in the 2nd year of the Master in Cyber-security and Forensic Informatics (MCIF) provided by the Polytechnic Institute of Leiria (IPL). The purpose of this project is to study SQL Injection vulnerabilities in web applications. According to OWASP (Open Web Application Security Project) [20][19], this is one of the more prevalent attacks on web applications. As part of this work a web application was implemented, which can from a URL address, go through all the endpoints of the target application and test for SQL Injection vulner
Gli stili APA, Harvard, Vancouver, ISO e altri

Libri sul tema "CD Security"

1

United States. Federal Trade Commission., ed. Business Briefcase, Now With Information Security Guide, (CD-ROM). s.n., 2009.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Dulaney, Emmett A. CompTIA Security+TM Study Guide. John Wiley & Sons, Ltd., 2010.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Jörn, Mothes, ed. Beschädigte Seelen: DDR-Jugend und Staatssicherheit : mit 136 Dokumenten und einer Audi-CD mit Original-Tonunterlagen. Edition Temmen, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Spafford. Security Companion CD. O'Reilly Media, 2003.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Dcd2, Master Carton 1000 Acscot. Cd/Cd-Rom Tattle Tape Security Strips. SCOTCH BLANK TAPE, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Media, Syngress. The Ultimate Techno Security CD. Syngress, 2005.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Rogers, Russ, and Susan Snedaker. Managing IT Security Ultimate CD. Syngress, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Wolfe, Paul. CompTIA Security + VTC Training CD. Virtual Training Company Inc, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Rogers, Russ, and Susan Snedaker. Managing IT Security Ultimate CD. Elsevier Science & Technology Books, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Brad Causey & Bobby Rogers. Linux Security VTC Training CD. Virtual Training Company, Inc., 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Capitoli di libri sul tema "CD Security"

1

Dingare, Pranoday Pramod. "Managing Security with Jenkins." In CI/CD Pipeline Using Jenkins Unleashed. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Moelyaningrum, Anita Dewi. "The Potential of Cacao Pod Rind Waste (Theobroma cacao) to Adsorb Heavy Metal (Pb and Cd) in Water." In Sustainable Future for Human Security. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5433-4_18.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Froehlich, Annette, Vincent Seffinga, and Ruiyan Qiu. "Initial Mandates of the Committee on the Peaceful Uses of Outer Space (COPUOS) and the Conference on Disarmament (CD)." In The United Nations and Space Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06025-1_2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Kuvendziev, Stefan, Mirko Marinkovski, Kiril Lisichkov, and Perica Paunović. "Artificial Neural Network Modeling of Cd(II) Ions Adsorption on Nano-porous Inorganic Sorbents." In Nanoscience Advances in CBRN Agents Detection, Information and Energy Security. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-9697-2_48.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Smulders, Marinus J. M., Luud J. W. J. Gilissen, Martina Juranić, Jan G. Schaart, and Clemens C. M. van de Wiel. "Gene Editing of Wheat to Reduce Coeliac Disease Epitopes in Gluten." In A Roadmap for Plant Genome Editing. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-46150-7_13.

Testo completo
Abstract (sommario):
AbstractBy using gene editing technologies such as CRISPR/Cas, precise modifications can be made in the genome. CRISPR/Cas is especially valuable for targeted mutagenesis in polyploids, as it can induce mutations of multiple alleles simultaneously, to obtain regenerants that are homozygous for the desired mutation. A range of gene-edited traits have been developed in hexaploid bread wheat, including various nutrition and health-related traits, plant architecture, pest and disease resistance, tolerance to abiotic stress, and traits that enable more efficient breeding. Wheat is also known as a c
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Froehlich, Annette, Vincent Seffinga, and Ruiyan Qiu. "The Development of the Mandates of the Committee on the Peaceful Uses of Outer Space (COPUOS) and the Conference on Disarmament (CD) and the Collaboration Between the Forums." In The United Nations and Space Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06025-1_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Dakic, Vedran, Jasmin Redzepagic, and Matej Basic. "CI/CD Toolset Security." In DAAAM Proceedings. DAAAM International Vienna, 2022. http://dx.doi.org/10.2507/33rd.daaam.proceedings.022.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Bowman, Gerald, Ben Rothke, Christopher Steinke, et al. "Physical Security." In Information Security Management Handbook on CD-ROM, 2006 Edition. Auerbach Publications, 2006. http://dx.doi.org/10.1201/noe0849385858.ch10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Herrmann, Debra, Ben Rothke, Robert Slade, et al. "Outsourcing Security." In Information Security Management Handbook on CD-ROM, 2006 Edition. Auerbach Publications, 2006. http://dx.doi.org/10.1201/noe0849385858.ch3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Silberschatz, Avi, Henry Korth, S. Sudarshan, et al. "Database Security and Privacy." In Computer Science Handbook, Second Edition CD-ROM. CRC Press, 2004. http://dx.doi.org/10.1201/9780203494455.sec6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "CD Security"

1

Afifah, Angelita Salsabila, Herman Kabetta, I. Komang Setia Buana, and Hermawan Setiawan. "Code Obfuscation in CI/CD Pipelines for Enhanced DevOps Security." In 2024 International Conference on Artificial Intelligence, Blockchain, Cloud Computing, and Data Analytics (ICoABCD). IEEE, 2024. http://dx.doi.org/10.1109/icoabcd63526.2024.10704536.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Saleh, Sabbir, Nazim Madhavji, and John Steinbacher. "Towards a Blockchain-Based CI/CD Framework to Enhance Security in Cloud Environments." In 20th International Conference on Evaluation of Novel Approaches to Software Engineering. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013298200003928.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Meliala, Rehmia, Charles Lim, and Joseph Andreas. "Integrating Security Testing in CI/CD Pipelines: Current Trends from Literature and Market." In 2024 Ninth International Conference on Informatics and Computing (ICIC). IEEE, 2024. https://doi.org/10.1109/icic64337.2024.10957011.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cheenepalli, Jayaprakashreddy, John D. Hastings, Khandaker Mamun Ahmed, and Chad Fenner. "Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011960.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Gugueoth, Vinay Kumar. "Enhanced Security Attack Detection and Prevention in 5G Networks Using CD-GELU-CNN and FMLRQC with HDFS-ECH-KMEANS." In 2024 8th International Conference on Computer, Software and Modeling (ICCSM). IEEE, 2024. http://dx.doi.org/10.1109/iccsm63823.2024.00015.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Bi, Chuanxue, and Nenad Jukic. "A security paradigm for Web databases." In the 37th annual Southeast regional conference (CD-ROM). ACM Press, 1999. http://dx.doi.org/10.1145/306363.306420.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Dixson, Ronald, Boon Ping Ng, Craig D. McGray, Ndubuisi G. Orji, and Jon Geist. "Progress on CD-AFM tip width calibration standards." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.921597.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Haigh, Mary K., Geoffrey R. Nash, Neil T. Gordon, et al. "Progress in negative luminescent Hg 1-x Cd x Te diode arrays." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2005. http://dx.doi.org/10.1117/12.603292.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Chekanova, Galina V., Ivan Y. Lartsev, Mikhail S. Nikitin, et al. "LWIR and VLWIR Hg 1-x Cd x Te photoconductors with improved responsivity." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.542056.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Villanger, Asta, Trond Brudevoll, and Knut Stenersen. "IR laser induced heating in Hg 0.72 Cd 0.28 Te." In Optics/Photonics in Security and Defence, edited by David H. Titterton. SPIE, 2006. http://dx.doi.org/10.1117/12.689696.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "CD Security"

1

D'Onofrio, Dominic. CI/CD Pipeline and DevSecOps Integration for Security and Load Testing. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2430395.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Chandramouli, Ramaswamy. Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Sebban, Fanny, James Revill, Johanna Kleffmann, Renata Hessmann Dalaqua, and Vivienne Zhang. Revitalizing the Conference on Disarmament: Workshop Report. The United Nations Institute for Disarmament Research, 2023. http://dx.doi.org/10.37559/wmd/23/cd-retreat.

Testo completo
Abstract (sommario):
The Conference on Disarmament (CD) has played a significant role in the negotiation of several major multilateral agreements that continue to contribute to global peace and security. More recently, however, negotiation in the CD has reached an impasse, leaving it unable to make progress on its agenda at a point of growing geopolitical tension. To address this issue, the United Nations Institute for Disarmament Research (UNIDIR), with the support of France and Germany, organized a high-level retreat in Montreux, Switzerland, on 22–23 June 2023 to discuss ideas to revitalize the work of the CD a
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Sebban, Fanny, James Revill, Johanna Kleffmann, Renata Hessmann Dalaqua, and Vivienne Zhang. Revitalizing the Conference on Disarmament: Workshop Report. The United Nations Institute for Disarmament Research, 2023. http://dx.doi.org/10.37559/wmd/23/cd-retreat.

Testo completo
Abstract (sommario):
The Conference on Disarmament (CD) has played a significant role in the negotiation of several major multilateral agreements that continue to contribute to global peace and security. More recently, however, negotiation in the CD has reached an impasse, leaving it unable to make progress on its agenda at a point of growing geopolitical tension. To address this issue, the United Nations Institute for Disarmament Research (UNIDIR), with the support of France and Germany, organized a high-level retreat in Montreux, Switzerland, on 22–23 June 2023 to discuss ideas to revitalize the work of the CD a
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Hendrick, Stephen, and Martin Mckeay. Addressing Cybersecurity Challenges in Open Source Software. The Linux Foundation, 2022. https://doi.org/10.70828/jxey9389.

Testo completo
Abstract (sommario):
While open source software is ubiquitous and generally regarded as being secure, software development practices vary widely across projects regarding application development practices, protocols to respond to defects, or lack of standardized selection criteria to determine which software components are more likely to be secure. Consequently, software supply chains are vulnerable to attack, with implications and challenges for open source project communities. To help improve the state of software supply chain security, new research was conducted in partnership with the Open Source Security Foun
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!