Letteratura scientifica selezionata sul tema "CD Security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "CD Security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "CD Security"
Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.
Testo completoMalipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.
Testo completoResearcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.
Testo completoRavi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.
Testo completoHo-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Testo completoSumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.
Testo completoPonaka, Kamalakar Reddy. "Shift-left approach for Vulnerability Management in SDLC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem9417.
Testo completoTipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.
Testo completoSatya Praveen Kumar, Naga. "Integrating Dynamic Security Testing Tools into CI/CD Pipelines: A Continuous Security Testing Case Study." International Journal of Science and Research (IJSR) 10, no. 4 (2021): 1403–5. http://dx.doi.org/10.21275/sr24615152732.
Testo completoPonaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.
Testo completoTesi sul tema "CD Security"
Raižys, Artūras. "Duomenų apsaugos metodai CD/DVD laikmenoms." Bachelor's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110831_114615-63291.
Testo completoPersson, Simone. "List of Security Concerns within Continuous Software Evolution." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254881.
Testo completoMoriconi, Florent. "Amélioration du cycle de développement logiciel via des approches basées sur les données." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS164.
Testo completoArnold, Brose, Kupfer, et al. "Mitteilungen des URZ 3/2004." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401111.
Testo completoBrás, André Emanuel Raínho. "Container security in CI/CD pipelines." Master's thesis, 2021. http://hdl.handle.net/10773/31292.
Testo completoZhygulskyy, Mykyta. "AUTOMATED, SCHEDULED AND CI /CD WEB INJECTION." Master's thesis, 2021. http://hdl.handle.net/10400.8/5786.
Testo completoLibri sul tema "CD Security"
United States. Federal Trade Commission., ed. Business Briefcase, Now With Information Security Guide, (CD-ROM). s.n., 2009.
Cerca il testo completoDulaney, Emmett A. CompTIA Security+TM Study Guide. John Wiley & Sons, Ltd., 2010.
Cerca il testo completoJörn, Mothes, ed. Beschädigte Seelen: DDR-Jugend und Staatssicherheit : mit 136 Dokumenten und einer Audi-CD mit Original-Tonunterlagen. Edition Temmen, 1996.
Cerca il testo completoDcd2, Master Carton 1000 Acscot. Cd/Cd-Rom Tattle Tape Security Strips. SCOTCH BLANK TAPE, 1996.
Cerca il testo completoRogers, Russ, and Susan Snedaker. Managing IT Security Ultimate CD. Syngress, 2007.
Cerca il testo completoWolfe, Paul. CompTIA Security + VTC Training CD. Virtual Training Company Inc, 2004.
Cerca il testo completoRogers, Russ, and Susan Snedaker. Managing IT Security Ultimate CD. Elsevier Science & Technology Books, 2007.
Cerca il testo completoBrad Causey & Bobby Rogers. Linux Security VTC Training CD. Virtual Training Company, Inc., 2006.
Cerca il testo completoCapitoli di libri sul tema "CD Security"
Dingare, Pranoday Pramod. "Managing Security with Jenkins." In CI/CD Pipeline Using Jenkins Unleashed. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5_7.
Testo completoMoelyaningrum, Anita Dewi. "The Potential of Cacao Pod Rind Waste (Theobroma cacao) to Adsorb Heavy Metal (Pb and Cd) in Water." In Sustainable Future for Human Security. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5433-4_18.
Testo completoFroehlich, Annette, Vincent Seffinga, and Ruiyan Qiu. "Initial Mandates of the Committee on the Peaceful Uses of Outer Space (COPUOS) and the Conference on Disarmament (CD)." In The United Nations and Space Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06025-1_2.
Testo completoKuvendziev, Stefan, Mirko Marinkovski, Kiril Lisichkov, and Perica Paunović. "Artificial Neural Network Modeling of Cd(II) Ions Adsorption on Nano-porous Inorganic Sorbents." In Nanoscience Advances in CBRN Agents Detection, Information and Energy Security. Springer Netherlands, 2014. http://dx.doi.org/10.1007/978-94-017-9697-2_48.
Testo completoSmulders, Marinus J. M., Luud J. W. J. Gilissen, Martina Juranić, Jan G. Schaart, and Clemens C. M. van de Wiel. "Gene Editing of Wheat to Reduce Coeliac Disease Epitopes in Gluten." In A Roadmap for Plant Genome Editing. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-46150-7_13.
Testo completoFroehlich, Annette, Vincent Seffinga, and Ruiyan Qiu. "The Development of the Mandates of the Committee on the Peaceful Uses of Outer Space (COPUOS) and the Conference on Disarmament (CD) and the Collaboration Between the Forums." In The United Nations and Space Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-06025-1_3.
Testo completoDakic, Vedran, Jasmin Redzepagic, and Matej Basic. "CI/CD Toolset Security." In DAAAM Proceedings. DAAAM International Vienna, 2022. http://dx.doi.org/10.2507/33rd.daaam.proceedings.022.
Testo completoBowman, Gerald, Ben Rothke, Christopher Steinke, et al. "Physical Security." In Information Security Management Handbook on CD-ROM, 2006 Edition. Auerbach Publications, 2006. http://dx.doi.org/10.1201/noe0849385858.ch10.
Testo completoHerrmann, Debra, Ben Rothke, Robert Slade, et al. "Outsourcing Security." In Information Security Management Handbook on CD-ROM, 2006 Edition. Auerbach Publications, 2006. http://dx.doi.org/10.1201/noe0849385858.ch3.
Testo completoSilberschatz, Avi, Henry Korth, S. Sudarshan, et al. "Database Security and Privacy." In Computer Science Handbook, Second Edition CD-ROM. CRC Press, 2004. http://dx.doi.org/10.1201/9780203494455.sec6.
Testo completoAtti di convegni sul tema "CD Security"
Afifah, Angelita Salsabila, Herman Kabetta, I. Komang Setia Buana, and Hermawan Setiawan. "Code Obfuscation in CI/CD Pipelines for Enhanced DevOps Security." In 2024 International Conference on Artificial Intelligence, Blockchain, Cloud Computing, and Data Analytics (ICoABCD). IEEE, 2024. http://dx.doi.org/10.1109/icoabcd63526.2024.10704536.
Testo completoSaleh, Sabbir, Nazim Madhavji, and John Steinbacher. "Towards a Blockchain-Based CI/CD Framework to Enhance Security in Cloud Environments." In 20th International Conference on Evaluation of Novel Approaches to Software Engineering. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013298200003928.
Testo completoMeliala, Rehmia, Charles Lim, and Joseph Andreas. "Integrating Security Testing in CI/CD Pipelines: Current Trends from Literature and Market." In 2024 Ninth International Conference on Informatics and Computing (ICIC). IEEE, 2024. https://doi.org/10.1109/icic64337.2024.10957011.
Testo completoCheenepalli, Jayaprakashreddy, John D. Hastings, Khandaker Mamun Ahmed, and Chad Fenner. "Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11011960.
Testo completoGugueoth, Vinay Kumar. "Enhanced Security Attack Detection and Prevention in 5G Networks Using CD-GELU-CNN and FMLRQC with HDFS-ECH-KMEANS." In 2024 8th International Conference on Computer, Software and Modeling (ICCSM). IEEE, 2024. http://dx.doi.org/10.1109/iccsm63823.2024.00015.
Testo completoBi, Chuanxue, and Nenad Jukic. "A security paradigm for Web databases." In the 37th annual Southeast regional conference (CD-ROM). ACM Press, 1999. http://dx.doi.org/10.1145/306363.306420.
Testo completoDixson, Ronald, Boon Ping Ng, Craig D. McGray, Ndubuisi G. Orji, and Jon Geist. "Progress on CD-AFM tip width calibration standards." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.921597.
Testo completoHaigh, Mary K., Geoffrey R. Nash, Neil T. Gordon, et al. "Progress in negative luminescent Hg 1-x Cd x Te diode arrays." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2005. http://dx.doi.org/10.1117/12.603292.
Testo completoChekanova, Galina V., Ivan Y. Lartsev, Mikhail S. Nikitin, et al. "LWIR and VLWIR Hg 1-x Cd x Te photoconductors with improved responsivity." In Defense and Security, edited by Bjorn F. Andresen and Gabor F. Fulop. SPIE, 2004. http://dx.doi.org/10.1117/12.542056.
Testo completoVillanger, Asta, Trond Brudevoll, and Knut Stenersen. "IR laser induced heating in Hg 0.72 Cd 0.28 Te." In Optics/Photonics in Security and Defence, edited by David H. Titterton. SPIE, 2006. http://dx.doi.org/10.1117/12.689696.
Testo completoRapporti di organizzazioni sul tema "CD Security"
D'Onofrio, Dominic. CI/CD Pipeline and DevSecOps Integration for Security and Load Testing. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2430395.
Testo completoChandramouli, Ramaswamy. Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.
Testo completoSebban, Fanny, James Revill, Johanna Kleffmann, Renata Hessmann Dalaqua, and Vivienne Zhang. Revitalizing the Conference on Disarmament: Workshop Report. The United Nations Institute for Disarmament Research, 2023. http://dx.doi.org/10.37559/wmd/23/cd-retreat.
Testo completoSebban, Fanny, James Revill, Johanna Kleffmann, Renata Hessmann Dalaqua, and Vivienne Zhang. Revitalizing the Conference on Disarmament: Workshop Report. The United Nations Institute for Disarmament Research, 2023. http://dx.doi.org/10.37559/wmd/23/cd-retreat.
Testo completoHendrick, Stephen, and Martin Mckeay. Addressing Cybersecurity Challenges in Open Source Software. The Linux Foundation, 2022. https://doi.org/10.70828/jxey9389.
Testo completo