Artykuły w czasopismach na temat „CD Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „CD Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Newman, Peter. "CD-ROM security issues." Computers & Security 14, no. 5 (1995): 422. http://dx.doi.org/10.1016/0167-4048(96)90044-9.
Pełny tekst źródłaMalipeddi, Anil Kumar, and Sreekanth Pasunuru. "Securing DevOps CI/CD pipelines with Agent-Based and Agentless Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/isjem01319.
Pełny tekst źródłaResearcher. "SECURING CI/CD PIPELINES: STRATEGIES FOR MITIGATING RISKS IN MODERN SOFTWARE DELIVERY." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 1–9. https://doi.org/10.5281/zenodo.13365012.
Pełny tekst źródłaRavi, Chandra Thota. "Cloud-Native DevSecOps: Integrating Security Automation into CI/CD Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–19. https://doi.org/10.5281/zenodo.15036934.
Pełny tekst źródłaHo-Dac, Hung, and Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools." European Modern Studies Journal 8, no. 3 (2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Pełny tekst źródłaSumanth Kadulla. "Zero trust in cloud infrastructure: Implementing secure CI/CD Pipelines." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 450–57. https://doi.org/10.30574/wjarr.2025.26.2.1662.
Pełny tekst źródłaPonaka, Kamalakar Reddy. "Shift-left approach for Vulnerability Management in SDLC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–14. http://dx.doi.org/10.55041/ijsrem9417.
Pełny tekst źródłaTipton, Jocelyn. "National security archive index on CD-ROM." Journal of Government Information 22, no. 5 (1995): 481–83. http://dx.doi.org/10.1016/1352-0237(95)90023-3.
Pełny tekst źródłaSatya Praveen Kumar, Naga. "Integrating Dynamic Security Testing Tools into CI/CD Pipelines: A Continuous Security Testing Case Study." International Journal of Science and Research (IJSR) 10, no. 4 (2021): 1403–5. http://dx.doi.org/10.21275/sr24615152732.
Pełny tekst źródłaPonaka, Kamalakar Reddy. "Systematic Approach to Prevent Code Vulnerabilities using CI/CD Pipelines." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem7171.
Pełny tekst źródłaDevashish Ghanshyambhai Patel. "Enhancing CI/CD security with provenance metadata and supply chain best practices." World Journal of Advanced Engineering Technology and Sciences 16, no. 1 (2025): 019–32. https://doi.org/10.30574/wjaets.2025.16.1.1181.
Pełny tekst źródłaSamuel Jesupelumi Owoade, Abel Uzoka, Joshua Idowu Akerele, and Pascal Ugochukwu Ojukwu. "Cloud-based compliance and data security solutions in financial applications using CI/CD pipelines." World Journal of Engineering and Technology Research 3, no. 2 (2024): 011–21. http://dx.doi.org/10.53346/wjetr.2024.3.2.0059.
Pełny tekst źródłaRohith Aitharaju. "Policy-driven infrastructure hardening using CI/CD pipelines in enterprise environments." International Journal of Science and Research Archive 7, no. 1 (2022): 591–602. https://doi.org/10.30574/ijsra.2022.7.1.0280.
Pełny tekst źródłaAkilnath, Bodipudi. "Integrating Vulnerability Scanning with Continuous Integration/Continuous Deployment (CI/CD) Pipelines." European Journal of Advances in Engineering and Technology 9, no. 2 (2022): 49–55. https://doi.org/10.5281/zenodo.13622978.
Pełny tekst źródłaYang, Shuai. "The Impact of Continuous Integration and Continuous Delivery on Software Development Efficiency." Journal of Computer, Signal, and System Research 2, no. 3 (2025): 59–68. https://doi.org/10.71222/pzvfqm21.
Pełny tekst źródłaBaladari, Venkata. "End-to-End CI/CD Deployment of RESTful Microservices in the Cloud." International Journal of Core Engineering and Management 6, no. 8 (2020): 262–68. https://doi.org/10.5281/zenodo.15020514.
Pełny tekst źródłaKamalakar, Reddy Ponaka. "Secure Secret Management in DevOps CI/CD Pipelines." European Journal of Advances in Engineering and Technology 7, no. 2 (2020): 73–76. https://doi.org/10.5281/zenodo.13919341.
Pełny tekst źródłaDachepally, Raju. "Continuous Integration and Continuous Delivery (CI/CD) Pipelines: Best Practices for Modern Enterprises." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 05, no. 10 (2021): 1–8. https://doi.org/10.55041/ijsrem10912.
Pełny tekst źródłaPalavesam, Kuppusamy Vellamadam, Siva Venkatesh Arcot, Mahesh Vaijainthymala Krishnamoorthy, and Ebishdon G V. "Building Automated Security Pipeline for Containerized Microservices." Journal of Advances in Mathematics and Computer Science 40, no. 2 (2025): 53–66. https://doi.org/10.9734/jamcs/2025/v40i21969.
Pełny tekst źródłaSarathe Krisshnan Jutoo Vijayaraghavan. "Security as code: Transforming DevSecOps through CI/CD Integration." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 2219–25. https://doi.org/10.30574/wjaets.2025.15.1.0446.
Pełny tekst źródłaZhao, Li, Fei Juan Wang, Hui Yang, Yu Xing Duan, and Chen Zhu. "Impacts of Nitrogen (Urea) Fertilization on Cadmium Accumulation Nitrate Contents and Nutritive Values in Chinese Cabbage." Advanced Materials Research 393-395 (November 2011): 809–17. http://dx.doi.org/10.4028/www.scientific.net/amr.393-395.809.
Pełny tekst źródłaWeimer, Katherine H., Laura Lillard, Wendi Arant, and David Mitchell. "Security and Access to CD-ROMs Accompanying Books." Library Resources & Technical Services 44, no. 4 (2000): 201–8. http://dx.doi.org/10.5860/lrts.44n4.201.
Pełny tekst źródłaBelsky, Jay, and Michael Rovine. "Q-Sort security and first-year nonmaternal care." New Directions for Child and Adolescent Development 1990, no. 49 (1990): 7–22. http://dx.doi.org/10.1002/cd.23219904903.
Pełny tekst źródłaHu, Ji, and Christoph Meinel. "Tele-Lab “IT-Security” on CD: portable, reliable and safe IT security training." Computers & Security 23, no. 4 (2004): 282–89. http://dx.doi.org/10.1016/j.cose.2004.02.005.
Pełny tekst źródłaADEDAMOLA ABIODUN SOLANKE. "Enterprise DevSecOps: Integrating security into CI/CD pipelines for regulated industries." World Journal of Advanced Research and Reviews 13, no. 2 (2022): 633–48. https://doi.org/10.30574/wjarr.2022.13.2.0121.
Pełny tekst źródłaRahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Secure-by-Design CI/CD Pipelines: A Zero Trust Framework for Cloud-Native Deployment Automation." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 211–19. https://doi.org/10.32996/jcsts.2025.7.5.27.
Pełny tekst źródłaBhosale, Pradeep. "A Comprehensive Guide to Secure Build Pipelines with Continuous Scanning." International Scientific Journal of Engineering and Management 04, no. 01 (2025): 1–6. https://doi.org/10.55041/isjem00438.
Pełny tekst źródłaXia, Shiwei, Liangyun Song, Yi Wu, et al. "An Integrated LHS–CD Approach for Power System Security Risk Assessment with Consideration of Source–Network and Load Uncertainties." Processes 7, no. 12 (2019): 900. http://dx.doi.org/10.3390/pr7120900.
Pełny tekst źródłaNardone, Claudia, Simone Russo, Simone Gazzillo, Raffaele Migliorini, Marco Trabucco Aurilio, and Francesco Saverio Mennini. "PP36 Inflammatory Bowel Disease: The Disability Costs Among Italian Workers." International Journal of Technology Assessment in Health Care 35, S1 (2019): 44. http://dx.doi.org/10.1017/s0266462319001995.
Pełny tekst źródłaRatnangi, Nirek. "Challenges and Solutions for Implementing CI/CD Pipelines in Linux-Based Development Frameworks." Journal of Scientific and Engineering Research 6, no. 6 (2019): 229–32. https://doi.org/10.5281/zenodo.13918897.
Pełny tekst źródłaReddy Pothu, Avinash. "Garlic Gate: Revolutionizing Application Security with Integrated Artificial Intelligence (AI) Across SDLC, CI/CD, and Advanced Methodologies." FMDB Transactions on Sustainable Computing Systems 2, no. 3 (2024): 119–30. https://doi.org/10.69888/ftscs.2024.000259.
Pełny tekst źródłaZulunov, Ravshanbek Mamatovich. "Security tools in a continuous integration/continuous deployment pipeline." Research and implementation 2, no. 12 (2024): 237–44. https://doi.org/10.5281/zenodo.14557311.
Pełny tekst źródłaNaga Murali Krishna Koneru. "Integrating Security into CI/CD Pipelines: A DevSecOps Approach with SAST, DAST, and SCA Tools." International Journal of Science and Research Archive 3, no. 1 (2021): 250–65. https://doi.org/10.30574/ijsra.2021.3.1.0080.
Pełny tekst źródłaAllam, Hitesh. "Security-Driven Pipelines: Embedding DevSecOps into CI/CD Workflows." International Journal of Emerging Trends in Computer Science and Information Technology 3, no. 1 (2022): 86–97. https://doi.org/10.63282/3050-9246.ijetcsit-v3i1p110.
Pełny tekst źródłaNikolay, Pavlov. "NATO's Concept Development and Experimentation Approach in the EU's Common Security and Defence Policy? – An Institutional Isomorphism Perspective." Defence Studies 22, no. 2 (2021): 211–30. https://doi.org/10.1080/14702436.2021.2008248.
Pełny tekst źródłaRahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, and Suvarna Rekha Karumanchi. "Advancing cloud platform engineering: Innovations in secure deployment automation, CI/CD, and Risk Mitigation for 2025." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 0149–56. https://doi.org/10.30574/wjaets.2025.15.3.0911.
Pełny tekst źródłaLinsmeier, Thomas J., Gerald J. Lobo, and George K. Kanaan. "Dispersion in Industry Price Changes and the Relative Association between Alternative Income Measures and Security Returns." Journal of Accounting, Auditing & Finance 10, no. 2 (1995): 365–79. http://dx.doi.org/10.1177/0148558x9501000211.
Pełny tekst źródłaKhattar, Kriti. "Docker Like a Pro: Essential Practices for Secure and Scalable Containers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41900.
Pełny tekst źródłaZhang, Yingfan, Tingting Fu, Xueyao Chen, Hancheng Guo, Hongyi Li, and Bifeng Hu. "Modeling Cadmium Contents in a Soil–Rice System and Identifying Potential Controls." Land 11, no. 5 (2022): 617. http://dx.doi.org/10.3390/land11050617.
Pełny tekst źródłaXu, Xinxin, Qingxian Mo, Zebin Cai, Qing Jiang, Danman Zhou, and Jicai Yi. "Promoters, Key Cis-Regulatory Elements, and Their Potential Applications in Regulation of Cadmium (Cd) in Rice." International Journal of Molecular Sciences 25, no. 24 (2024): 13237. https://doi.org/10.3390/ijms252413237.
Pełny tekst źródłaBondalapati, Rahul Chowdary, and Satish Kumar Malaraju. "Enhancing Secure Deployment Automation in Cloud Environments: A Risk-Driven Approach to CI/CD Pipelines." European Journal of Computer Science and Information Technology 13, no. 38 (2025): 60–75. https://doi.org/10.37745/ejcsit.2013/vol13n386075.
Pełny tekst źródłaTaiwo Joseph Akinbolaji, Godwin Nzeako, David Akokodaripon, and Akorede Victor Aderoju. "Automation in Cloud-Based DevOps: A Guide to CI/CD Pipelines and Infrastructure as Code (IaC) with Terraform and Jenkins." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 090–104. http://dx.doi.org/10.30574/wjaets.2024.13.2.0542.
Pełny tekst źródłaDavid Akokodaripon and Godwin Nzeako. "Enhancing data engineering workflows with CI/CD process optimization using terraform: Reducing deployment time and operational overhead." World Journal of Advanced Research and Reviews 19, no. 3 (2023): 1639–46. https://doi.org/10.30574/wjarr.2023.19.3.1795.
Pełny tekst źródłaBhardwaj, Arvind Kumar, P. K. Dutta, and Pradeep Chintale. "Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines." Babylonian Journal of Networking 2024 (August 20, 2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.
Pełny tekst źródłaLin, Qi, Qing-Ping Yang, Bin Sun, et al. "Competitive coordination control of the AIE and micro states of supramolecular gel: an efficient approach for reversible dual-channel stimuli-response materials." Soft Matter 10, no. 42 (2014): 8427–32. http://dx.doi.org/10.1039/c4sm01288g.
Pełny tekst źródłaRida, Abderrahim, and Ayoub Ait Lahcen. "Towards DevSecOps Model for Multi-tier Web Applications." ITM Web of Conferences 69 (2024): 04018. https://doi.org/10.1051/itmconf/20246904018.
Pełny tekst źródłaSrikanth, Prabhu Muthusamy, and Rama Krishna Inampudi. "Consent-Driven Continuous Delivery with Open Policy Agent and Spinnaker." Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 4, no. 2 (2025): 102–12. https://doi.org/10.60087/jklst.v4.n2.009.
Pełny tekst źródłaYogeswara, Reddy Avuthu. "Balancing Speed and Security in DevOps Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 5, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.14183889.
Pełny tekst źródłaChirag, Amrutlal Pethad. "Design and Build a CI/CD pipeline for Salesforce." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 136–46. https://doi.org/10.5281/zenodo.13919671.
Pełny tekst źródłaPochu, Sandeep, Sai Rama Krishna Nersu, and Srikanth Reddy Kathram. "Zero Trust Principles in Cloud Security: A DevOps Perspective." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 6, no. 1 (2024): 660–71. https://doi.org/10.60087/jaigs.v6i1.302.
Pełny tekst źródła