{"product_id":"software-supply-chain-security-securing-the-end-to-end-supply-chain-for-software-firmware-and-hardware-paperback","title":"Software Supply Chain Security: Securing the End-To-End Supply Chain for Software, Firmware, and Hardware - Paperback","description":"\u003cdiv\u003e\u003cp style=\"text-align: right;\"\u003e\u003ca href=\"https:\/\/reportcopyrightinfringement.com\/\" target=\"_blank\" rel=\"nofollow\"\u003e\u003cb\u003eReport copyright infringement\u003c\/b\u003e\u003c\/a\u003e\u003c\/p\u003e\u003c\/div\u003e\u003cp\u003eby \u003cb\u003eCassie Crossley\u003c\/b\u003e (Author)\u003c\/p\u003e\u003cp\u003e\u003c\/p\u003e\u003cp\u003eTrillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process. \u003c\/p\u003e\u003cp\u003e This practical book gives you a comprehensive look at security risks and identifies the practical controls you need to incorporate into your end-to-end software supply chain. Author Cassie Crossley demonstrates how and why everyone involved in the supply chain needs to participate if your organization is to improve the security posture of its software, firmware, and hardware. \u003c\/p\u003e\u003cp\u003e With this book, you'll learn how to: \u003c\/p\u003e\u003cul\u003e \u003cli\u003ePinpoint the cybersecurity risks in each part of your organization's software supply chain \u003c\/li\u003e\n\u003cli\u003eIdentify the roles that participate in the supply chain--including IT, development, operations, manufacturing, and procurement \u003c\/li\u003e\n\u003cli\u003eDesign initiatives and controls for each part of the supply chain using existing frameworks and references \u003c\/li\u003e\n\u003cli\u003eImplement secure development lifecycle, source code security, software build management, and software transparency practices \u003c\/li\u003e\n\u003cli\u003eEvaluate third-party risk in your supply chain \u003c\/li\u003e\n\u003c\/ul\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003eNumber of Pages:\u003c\/strong\u003e 242\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003eDimensions:\u003c\/strong\u003e 0.51 x 9.19 x 7 IN\u003c\/div\u003e\n            \u003cdiv\u003e\n\u003cstrong\u003ePublication Date:\u003c\/strong\u003e March 12, 2024\u003c\/div\u003e\n            ","brand":"BooksCloud","offers":[{"title":"Default Title","offer_id":52494184120627,"sku":"9781098133702","price":67.46,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0300\/5595\/6612\/files\/BHWoMooCjz9781098133702.webp?v=1759974839","url":"https:\/\/www.vysn.com\/en-ca\/products\/software-supply-chain-security-securing-the-end-to-end-supply-chain-for-software-firmware-and-hardware-paperback","provider":"VYSN","version":"1.0","type":"link"}