Articoli di riviste sul tema "CD Security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "CD Security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.
Testo completoMalipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.
Testo completoResearcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.
Testo completoRavi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.
Testo completoHo-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Testo completoSumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.
Testo completoPonaka, Kamalakar Reddy. "Shift-left approach for Vulnerability Management in SDLC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem9417.
Testo completoTipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.
Testo completoSatya Praveen Kumar, Naga. "Integrating Dynamic Security Testing Tools into CI/CD Pipelines: A Continuous Security Testing Case Study." International Journal of Science and Research (IJSR) 10, no. 4 (2021): 1403–5. http://dx.doi.org/10.21275/sr24615152732.
Testo completoPonaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.
Testo completoDevashish Ghanshyambhai Patel. "Enhancing CI/CD security with provenance metadata and supply chain best practices." World Journal of Advanced Engineering Technology and Sciences 16, no. 1 (2025): 019–32. https://doi.org/10.30574/wjaets.2025.16.1.1181.
Testo completoSamuel Jesupelumi Owoade, Abel Uzoka, Joshua Idowu Akerele, and Pascal Ugochukwu Ojukwu. "Cloud-based compliance and data security solutions in financial applications using CI/CD pipelines." World Journal of Engineering and Technology Research 3, no. 2 (2024): 011–21. http://dx.doi.org/10.53346/wjetr.2024.3.2.0059.
Testo completoRohith Aitharaju. "Policy-driven infrastructure hardening using CI/CD pipelines in enterprise environments." International Journal of Science and Research Archive 7, no. 1 (2022): 591–602. https://doi.org/10.30574/ijsra.2022.7.1.0280.
Testo completoAkilnath, Bodipudi. "Integrating Vulnerability Scanning with Continuous Integration/Continuous Deployment (CI/CD) Pipelines." European Journal of Advances in Engineering and Technology 9, no. 2 (2022): 49–55. https://doi.org/10.5281/zenodo.13622978.
Testo completoYang, Shuai. "The Impact of Continuous Integration and Continuous Delivery on Software Development Efficiency." Journal of Computer, Signal, and System Research 2, no. 3 (2025): 59–68. https://doi.org/10.71222/pzvfqm21.
Testo completoBaladari, Venkata. "End-to-End CI/CD Deployment of RESTful Microservices in the Cloud." International Journal of Core Engineering and Management 6, no. 8 (2020): 262–68. https://doi.org/10.5281/zenodo.15020514.
Testo completoKamalakar, Reddy Ponaka. "Secure Secret Management in DevOps CI/CD Pipelines." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 73–76. https://doi.org/10.5281/zenodo.13919341.
Testo completoDachepally, Raju. "Continuous Integration and Continuous Delivery (CI/CD) Pipelines: Best Practices for Modern Enterprises." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 05, no. 10 (2021): 1–8. https://doi.org/10.55041/ijsrem10912.
Testo completoPalavesam, Kuppusamy Vellamadam, Siva Venkatesh Arcot, Mahesh Vaijainthymala Krishnamoorthy, and Ebishdon G V. "Building Automated Security Pipeline for Containerized Microservices." Journal of Advances in Mathematics and Computer Science 40, no. 2 (2025): 53–66. https://doi.org/10.9734/jamcs/2025/v40i21969.
Testo completoSarathe Krisshnan Jutoo Vijayaraghavan. "Security as code: Transforming DevSecOps through CI/CD Integration." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 2219–25. https://doi.org/10.30574/wjaets.2025.15.1.0446.
Testo completoZhao, Li, Fei Juan Wang, Hui Yang, Yu Xing Duan, and Chen Zhu. "Impacts of Nitrogen (Urea) Fertilization on Cadmium Accumulation Nitrate Contents and Nutritive Values in Chinese Cabbage." Advanced Materials Research 393-395 (November 2011): 809–17. http://dx.doi.org/10.4028/www.scientific.net/amr.393-395.809.
Testo completoWeimer, Katherine H., Laura Lillard, Wendi Arant, and David Mitchell. "Security and Access to CD-ROMs Accompanying Books." Library Resources & Technical Services 44, no. 4 (2000): 201–8. http://dx.doi.org/10.5860/lrts.44n4.201.
Testo completoBelsky, Jay, and Michael Rovine. "Q-Sort security and first-year nonmaternal care." New Directions for Child and Adolescent Development 1990, no. 49 (1990): 7–22. http://dx.doi.org/10.1002/cd.23219904903.
Testo completoHu, Ji, and Christoph Meinel. "Tele-Lab “IT-Security” on CD: portable, reliable and safe IT security training." Computers & Security 23, no. 4 (2004): 282–89. http://dx.doi.org/10.1016/j.cose.2004.02.005.
Testo completoADEDAMOLA ABIODUN SOLANKE. "Enterprise DevSecOps: Integrating security into CI/CD pipelines for regulated industries." World Journal of Advanced Research and Reviews 13, no. 2 (2022): 633–48. https://doi.org/10.30574/wjarr.2022.13.2.0121.
Testo completoRahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Secure-by-Design CI/CD Pipelines: A Zero Trust Framework for Cloud-Native Deployment Automation." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 211–19. https://doi.org/10.32996/jcsts.2025.7.5.27.
Testo completoBhosale, Pradeep. "A Comprehensive Guide to Secure Build Pipelines with Continuous Scanning." International Scientific Journal of Engineering and Management 04, no. 01 (2025): 1–6. https://doi.org/10.55041/isjem00438.
Testo completoXia, Shiwei, Liangyun Song, Yi Wu, et al. "An Integrated LHS–CD Approach for Power System Security Risk Assessment with Consideration of Source–Network and Load Uncertainties." Processes 7, no. 12 (2019): 900. http://dx.doi.org/10.3390/pr7120900.
Testo completoNardone, Claudia, Simone Russo, Simone Gazzillo, Raffaele Migliorini, Marco Trabucco Aurilio, and Francesco Saverio Mennini. "PP36 Inflammatory Bowel Disease: The Disability Costs Among Italian Workers." International Journal of Technology Assessment in Health Care 35, S1 (2019): 44. http://dx.doi.org/10.1017/s0266462319001995.
Testo completoRatnangi, Nirek. "Challenges and Solutions for Implementing CI/CD Pipelines in Linux-Based Development Frameworks." Journal of Scientific and Engineering Research 6, no. 6 (2019): 229–32. https://doi.org/10.5281/zenodo.13918897.
Testo completoReddy Pothu, Avinash. "Garlic Gate: Revolutionizing Application Security with Integrated Artificial Intelligence (AI) Across SDLC, CI/CD, and Advanced Methodologies." FMDB Transactions on Sustainable Computing Systems 2, no. 3 (2024): 119–30. https://doi.org/10.69888/ftscs.2024.000259.
Testo completoZulunov, Ravshanbek Mamatovich. "Security tools in a continuous integration/continuous deployment pipeline." Research and implementation 2, no. 12 (2024): 237–44. https://doi.org/10.5281/zenodo.14557311.
Testo completoNaga Murali Krishna Koneru. "Integrating Security into CI/CD Pipelines: A DevSecOps Approach with SAST, DAST, and SCA Tools." International Journal of Science and Research Archive 3, no. 1 (2021): 250–65. https://doi.org/10.30574/ijsra.2021.3.1.0080.
Testo completoAllam, Hitesh. "Security-Driven Pipelines: Embedding DevSecOps into CI/CD Workflows." International Journal of Emerging Trends in Computer Science and Information Technology 3, no. 1 (2022): 86–97. https://doi.org/10.63282/3050-9246.ijetcsit-v3i1p110.
Testo completoNikolay, Pavlov. "NATO's Concept Development and Experimentation Approach in the EU's Common Security and Defence Policy? – An Institutional Isomorphism Perspective." Defence Studies 22, no. 2 (2021): 211–30. https://doi.org/10.1080/14702436.2021.2008248.
Testo completoRahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.
Testo completoLinsmeier, Thomas J., Gerald J. Lobo, and George K. Kanaan. "Dispersion in Industry Price Changes and the Relative Association between Alternative Income Measures and Security Returns." Journal of Accounting, Auditing & Finance 10, no. 2 (1995): 365–79. http://dx.doi.org/10.1177/0148558x9501000211.
Testo completoKhattar, Kriti. "Docker Like a Pro: Essential Practices for Secure and Scalable Containers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41900.
Testo completoZhang, Yingfan, Tingting Fu, Xueyao Chen, Hancheng Guo, Hongyi Li, and Bifeng Hu. "Modeling Cadmium Contents in a Soil–Rice System and Identifying Potential Controls." Land 11, no. 5 (2022): 617. http://dx.doi.org/10.3390/land11050617.
Testo completoXu, Xinxin, Qingxian Mo, Zebin Cai, Qing Jiang, Danman Zhou, and Jicai Yi. "Promoters, Key Cis-Regulatory Elements, and Their Potential Applications in Regulation of Cadmium (Cd) in Rice." International Journal of Molecular Sciences 25, no. 24 (2024): 13237. https://doi.org/10.3390/ijms252413237.
Testo completoBondalapati, Rahul Chowdary, and Satish Kumar Malaraju. "Enhancing Secure Deployment Automation in Cloud Environments: A Risk-Driven Approach to CI/CD Pipelines." European Journal of Computer Science and Information Technology 13, no. 38 (2025): 60–75. https://doi.org/10.37745/ejcsit.2013/vol13n386075.
Testo completoTaiwo Joseph Akinbolaji, Godwin Nzeako, David Akokodaripon, and Akorede Victor Aderoju. "Automation in Cloud-Based DevOps: A Guide to CI/CD Pipelines and Infrastructure as Code (IaC) with Terraform and Jenkins." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 090–104. http://dx.doi.org/10.30574/wjaets.2024.13.2.0542.
Testo completoDavid Akokodaripon and Godwin Nzeako. "Enhancing data engineering workflows with CI/CD process optimization using terraform: Reducing deployment time and operational overhead." World Journal of Advanced Research and Reviews 19, no. 3 (2023): 1639–46. https://doi.org/10.30574/wjarr.2023.19.3.1795.
Testo completoBhardwaj, Arvind Kumar, P. K. Dutta, and Pradeep Chintale. "Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines." Babylonian Journal of Networking 2024 (August 20, 2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.
Testo completoLin, Qi, Qing-Ping Yang, Bin Sun, et al. "Competitive coordination control of the AIE and micro states of supramolecular gel: an efficient approach for reversible dual-channel stimuli-response materials." Soft Matter 10, no. 42 (2014): 8427–32. http://dx.doi.org/10.1039/c4sm01288g.
Testo completoRida, Abderrahim, and Ayoub Ait Lahcen. "Towards DevSecOps Model for Multi-tier Web Applications." ITM Web of Conferences 69 (2024): 04018. https://doi.org/10.1051/itmconf/20246904018.
Testo completoSrikanth, Prabhu Muthusamy, and Rama Krishna Inampudi. "Consent-Driven Continuous Delivery with Open Policy Agent and Spinnaker." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 4, no. 2 (2025): 102–12. https://doi.org/10.60087/jklst.v4.n2.009.
Testo completoYogeswara, Reddy Avuthu. "Balancing Speed and Security in DevOps Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 5, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.14183889.
Testo completoChirag, Amrutlal Pethad. "Design and Build a CI/CD pipeline for Salesforce." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 136–46. https://doi.org/10.5281/zenodo.13919671.
Testo completoPochu, Sandeep, Sai Rama Krishna Nersu, and Srikanth Reddy Kathram. "Zero Trust Principles in Cloud Security: A DevOps Perspective." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 6, no. 1 (2024): 660–71. https://doi.org/10.60087/jaigs.v6i1.302.
Testo completo