Academic literature on the topic 'Sécurité de la CI/CD'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sécurité de la CI/CD.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sécurité de la CI/CD"
Chauvenet, Antoinette, Georges Benguigui, and Françoise Orlic. "Sécurité, insécurité et prisons." IV. Ceux qui contrôlent, no. 30 (October 16, 2015): 135–43. http://dx.doi.org/10.7202/1033672ar.
Full textRoy, Martin, Charles-Philippe David, and Jean-Philippe Racicot. "Discours multilatéraliste, leadership réaliste : l'évolution de la conduite institutionnelle de sécurité des États-Unis sous Clinton." Études internationales 30, no. 2 (April 12, 2005): 233–56. http://dx.doi.org/10.7202/704027ar.
Full textMulone1, Massimiliano. "Directeurs de sécurité en entreprise et consommation de la sécurité. Étude exploratoire canadienne." Criminologie 46, no. 2 (December 13, 2013): 149–70. http://dx.doi.org/10.7202/1020991ar.
Full textMayens, Paul. "Assurer le développement ou développer l’assurance : les discours experts sur la sécurité sociale dans les pays du Sud (1950-1975)." Monde(s) N° 25, no. 1 (May 28, 2024): 69–90. http://dx.doi.org/10.3917/mond1.225.0069.
Full textSetyoko, Andreas Dimas, and Amalia Zahra. "Perbandingan Efisiensi Proses CI/CD Multi-Lingkungan melalui Implementasi Paralel dan Berurutan." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 3 (May 25, 2024): 911–25. http://dx.doi.org/10.57152/malcom.v4i3.1334.
Full textSingh, Nikhil. "CI/CD Pipeline for Web Applications." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 5218–26. http://dx.doi.org/10.22214/ijraset.2023.52867.
Full textKiss, Áron. "An explorative analysis of managed CI/CD usage among open-source C/C++ projects." Production Systems and Information Engineering 10, no. 3 (2022): 16–25. http://dx.doi.org/10.32968/psaie.2022.3.2.
Full textRoberge, Marie-Claude. "Compétence des Tribunaux ad hoc pour l'ex-Yougoslavie et le Rwanda concernant les crimes contre l'humanité et le crime de génocide." Revue Internationale de la Croix-Rouge 79, no. 828 (December 1997): 695–710. http://dx.doi.org/10.1017/s0035336100057191.
Full textLe, P. H., C. H. Chiu, and C. T. Chiu. "P174 Clostridium innocuum Infection in Inpatients with Inflammatory Bowel Disease." Journal of Crohn's and Colitis 16, Supplement_1 (January 1, 2022): i243. http://dx.doi.org/10.1093/ecco-jcc/jjab232.302.
Full textZhang, Wangdong, Yanyun Fan, and Meijun Chen. "Clinical Value of Detecting Fecal Calprotectin by Using Colloidal Gold Assay in Screening or Diagnosing Crohn’s Disease." Gastroenterology Research and Practice 2023 (November 9, 2023): 1–6. http://dx.doi.org/10.1155/2023/8866828.
Full textDissertations / Theses on the topic "Sécurité de la CI/CD"
Moriconi, Florent. "Amélioration du cycle de développement logiciel via des approches basées sur les données." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS164.
Full textThis thesis explores data-driven approaches for automated root cause analysis of CI/CD build failures, focusing on identifying non-deterministic failures, locating root cause messages in build logs, and characterizing CI/CD systems' performance and security. Grounded on public and industrial datasets, we explore CI/CD workflow properties, such as execution times and failure patterns. The research introduces the use of Natural Language Processing (NLP) and Knowledge Graphs Embeddings (KGE) for classifying build failures with a 94% accuracy. Additionally, we introduce ChangeMyMind, a new method based on Recurrent Neural Networks (RNNs) to accurately locate root cause messages in build logs without prior labeling of root cause messages. We propose X-Ray-TLS, a generic and transparent approach for inspecting TLS-encrypted network traffic in CI/CD environments. Finally, the thesis also revisits security vulnerabilities in CI/CD systems, demonstrating the potential for undetectable long-term compromises. This work has resulted in three publications and two under-review submissions, contributing significantly to CI/CD system analysis and optimization
Petersson, Karl. "Test automation in a CI/CD workflow." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96253.
Full textVíšek, Jakub. "Hromadná orchestrácia v multirepo CI/CD prostrediach." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445562.
Full textAndell, Anton, Nigel Cole, Wiktor Karlsson, Eric Lilja, Diba Rezaie, David Thimren, and Andreas Zeijlon. "CI/CD i molnapplikationer som Google Cloud, Azure och AWS." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157779.
Full textOrmoš, Michal. "Infrastruktura pro testování a nasazení real-time lokalizační platformy." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417266.
Full textNami, Fereshta, and Lisa Laurent. "Mjukvarutester : En studie om när manuella respektive automatiserade tester används i praktiken." Thesis, Uppsala universitet, Institutionen för informatik och media, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-448086.
Full textDenna studie riktar in sig på att undersöka när anställda inom IT-branschen upplever att det är mer gynnsamt att använda sig av automatiserade tester respektive manuella tester. Syftet med studien är att undersöka hur olika företag använder sig, arbetar med och ser på de två olika testmetoderna i praktiken. Fyra stycken faktorer som påverkar valet av testmetod har tagits fram som ramverk som är baserad på fem artiklar där samtliga diskuterar krav och kriterier för de två olika testmetoderna. Genom att utföra en intervjustudie med semi-strukturerade intervjuer har data samlats in från två olika företag. Den insamlade datan har i sin tur analyserats utifrån de olika faktorerna som tagits fram nämligen: Antalet testfall/testkörningar, tekniska aspekter, funktioner som ska testas samt resurser. Utifrån analysen har det varit tydligt att åsikterna från de olika respondenterna samt från tidigare forskning ofta är på samma spår. Därmed har de olika kriterierna kunnat diskuterats och motiveringarna till när respondenterna använder sig av respektive metod kunnat benas ut. Dock blir det också tydligt att i slutändan är det resurser, oftast antalet arbetstimmar och den monetära kostnaden, som styr vad som borde väljas.
Baldassarri, Marco. "Sviluppo di un progetto di UI automation testing con approccio BDD e gestione delle CI/CD pipelines." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textСавичев, И. Н., and I. N. Savichev. "Разработка клиентской части веб-приложения «Мониторинг IT-конференций» : магистерская диссертация." Master's thesis, б. и, 2021. http://hdl.handle.net/10995/100808.
Full textFinal qualification work 56 pages, 19 figures, 11 sources, 8 appendices. The purpose of the work is to develop the client part of the web application "Monitoring of IT conferences". In the process, we analyzed popular frameworks for web development, configured integration with CDN servers based on the Surge service, created a Docker image with a web application, configured integration with GitHub Actions for CI/CD, configured client and server monitoring based on Sentry. As a result of the final qualifying work, the client part was developed on the basis of the Next framework.js for the IT Conference Monitoring web application.
Persson, Simone. "List of Security Concerns within Continuous Software Evolution." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254881.
Full textI en tid då mängden data som samlas in om individer ökar i ohindrad takt, blir frågor om integritet och informationssäkerhet viktigare än någonsin. Kraven på snabb utveckling och förändring präglar även metoderna för mjukvaruutveckling. Produkter och tjänster måste konstant anpassas efter kundernas önskemål för att förbli relevant på marknaden. Arbetssätt och teknologier har utvecklats över tid för att möjliggöra mjukvara som uppdateras kontinuerligt. Konstant föränderlig mjukvara leder dock till oro för kvalitén och säkerheten av uppdateringarna. Den här uppsatsen är en litteraturstudie som undersöker utmaningarna att säkerställa säkerhet för mjukvara som uppdateras kontinuerligt. Problemet som löses genom studien är den saknade helhetsbilden av säkerhetsproblem vid kontinuerligt föränderlig mjukvara. Resultatet sammanfattas i en checklista för områden som väcker oro för säkerheten vid arbetssätt som tillåter kontinuerliga uppdateringar i moln-miljöer. Studien visar att leverera säkra lösningar kontinuerligt är en svår uppgift. Det kräver nära samarbete mellan team som sköter olika delar av mjukvaruutveckling. Detta fordrar vida kompetenser som inkluderar förståelse av varandras arbete. Att finna personal med tillräckligt vida kompetenser uppskattas vara problematiskt.
Björnholm, Jimmy. "Performance of DevOps compared to DevSecOps : DevSecOps pipelines benchmarked!" Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166985.
Full textBooks on the topic "Sécurité de la CI/CD"
Dingare, Pranoday Pramod. CI/CD Pipeline Using Jenkins Unleashed. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5.
Full textvan Merode, Henry. Continuous Integration (CI) and Continuous Delivery (CD). Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9228-0.
Full textWalter, Panek Bernhard. Synergetisches Marketing I: Grundlagen der Sinneswahrnehmung und der Kommunikation, Gestaltung mit Schrift, Form und Farbe, Reproduktions- und Drucktechnik, CI und CD, Werbepsychologie, Print Production - Drucksorteneinkauf, historischer Überblick Medientechnik. Wien: Wiener Universitätsverlag Facultas (www.facultas.at), 2002.
Find full textCI/CD Pipeline Using Jenkins Unleashed: Solutions While Setting up CI/CD Processes. Apress L. P., 2022.
Find full textCi vuole orecchio!: Libro + CD-audio 2. Alma Edizioni, 2017.
Find full textAnzivino, Katia D'Angelo Filomena. Ci vuole orecchio!: Libro & CD-audio 3. Nuans, 2009.
Find full textAnzivino, Katia D'Angelo Filomena. Ci vuole orecchio!: Libro + CD-audio 1. Nuans, 2012.
Find full textBuilding CI/CD Systems Using Tekton: Develop Flexible and Powerful CI/CD Pipelines Using Tekton Pipelines and Triggers. de Gruyter GmbH, Walter, 2021.
Find full textBuilding CI/CD Systems Using Tekton: Develop Flexible and Powerful CI/CD Pipelines Using Tekton Pipelines and Triggers. Packt Publishing, Limited, 2021.
Find full textSécurité maximale, des systèmes et réseaux (1 livre + 1 CD-ROM). CampusPress, 2003.
Find full textBook chapters on the topic "Sécurité de la CI/CD"
Dingare, Pranoday Pramod. "Understanding CI/CD." In CI/CD Pipeline Using Jenkins Unleashed, 1–7. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5_1.
Full textKhushalani, Prateek. "CI/CD Systems." In Kubernetes Application Developer, 69–93. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8032-4_3.
Full textvan Merode, Henry. "CI/CD Concepts." In Continuous Integration (CI) and Continuous Delivery (CD), 11–27. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9228-0_2.
Full textJohnston, Craig. "In-Platform CI/CD." In Advanced Platform Development with Kubernetes, 117–52. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5611-4_4.
Full textJackson, Les. "The CI/CD Pipeline." In The Complete ASP.NET Core 3 API Tutorial, 305–47. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6255-9_12.
Full textModi, Ritesh. "CI/CD with Terraform." In Deep-Dive Terraform on Azure, 163–90. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7328-9_7.
Full textAhmed Shaikh, Kasam, and Shailesh S. Agaskar. "CI/CD for AKS." In Azure Kubernetes Services with Microservices, 151–240. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7809-3_6.
Full textLoubser, Nico. "Hosting and CI/CD." In Software Engineering for Absolute Beginners, 313–24. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6622-9_11.
Full textClaßen, Henrik, Jonas Thierfeldt, Julian Tochman-Szewc, Philipp Wiesner, and Odej Kao. "Carbon-Awareness in CI/CD." In Lecture Notes in Computer Science, 213–24. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0989-2_17.
Full textvan Merode, Henry. "The Pitfalls of CI/CD." In Continuous Integration (CI) and Continuous Delivery (CD), 1–9. Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9228-0_1.
Full textConference papers on the topic "Sécurité de la CI/CD"
Wadhams, Zachary, Ann Marie Reinhold, and Clemente Izurieta. "Automating Static Code Analysis Through CI/CD Pipeline Integration." In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C), 119–25. IEEE, 2024. http://dx.doi.org/10.1109/saner-c62648.2024.00021.
Full textDi Carlo, Matteo, Piers Harding, Ugur Ylmaz, Dalmiro Maia, Bruno Ribeiro, Domingos Nunes, Diogo Regateiro, et al. "CI-CD practices at SKA." In Software and Cyberinfrastructure for Astronomy VII, edited by Gianluca Chiozzi and Jorge Ibsen. SPIE, 2022. http://dx.doi.org/10.1117/12.2620526.
Full textNandgaonkar, Swaralee, and Vaibhav Khatavkar. "CI-CD Pipeline For Content Releases." In 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT). IEEE, 2022. http://dx.doi.org/10.1109/gcat55367.2022.9972129.
Full textda Gião, Hugo, Rui Pereira, and Jácome Cunha. "CI/CD Meets Block-Based Languages." In 2023 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). IEEE, 2023. http://dx.doi.org/10.1109/vl-hcc57772.2023.00039.
Full textM K, Nalini, Mahalakshmi B S, Nevya Khandelwal, Nandan Pai, and Sharan L. "CI/CD Pipeline with Vulnerability Mitigation." In 2023 International Conference on Recent Advances in Science and Engineering Technology (ICRASET). IEEE, 2023. http://dx.doi.org/10.1109/icraset59632.2023.10419921.
Full textHenderson, Tim A. D., John Micco, and Bao Nguyen. "ICST 2020 CI/CD Industry Workshop Program." In 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2020. http://dx.doi.org/10.1109/icstw50294.2020.00006.
Full textBajpai, Pranshu, and Adam Lewis. "Secure Development Workflows in CI/CD Pipelines." In 2022 IEEE Secure Development Conference (SecDev). IEEE, 2022. http://dx.doi.org/10.1109/secdev53368.2022.00024.
Full textTalekar, Mayuri, and Varsha K. Harpale. "CI-CD Workflow For Embedded System Design." In 2023 7th International Conference On Computing, Communication, Control And Automation (ICCUBEA). IEEE, 2023. http://dx.doi.org/10.1109/iccubea58933.2023.10392168.
Full text"Keynote Talk - Industry Best Practices for CI/CD." In 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST). IEEE, 2021. http://dx.doi.org/10.1109/icst49551.2021.00012.
Full textLiao, Qianying. "Modelling CI/CD Pipeline Through Agent-Based Simulation." In 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2020. http://dx.doi.org/10.1109/issrew51248.2020.00059.
Full textReports on the topic "Sécurité de la CI/CD"
D'Onofrio, Dominic. CI/CD Pipeline and DevSecOps Integration for Security and Load Testing. Office of Scientific and Technical Information (OSTI), August 2023. http://dx.doi.org/10.2172/2430395.
Full textChandramouli, Ramaswamy. Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.
Full textPorat, Ron, Gregory T. McCollum, Amnon Lers, and Charles L. Guy. Identification and characterization of genes involved in the acquisition of chilling tolerance in citrus fruit. United States Department of Agriculture, December 2007. http://dx.doi.org/10.32747/2007.7587727.bard.
Full textCastets-Renard, Céline, Pierre-Luc Déziel, and Lyse Langlois. Observations sur le document d'orientation sur la protection de la vie privée à l'intention des services de police relativement à la reconnaissance faciale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, June 2021. http://dx.doi.org/10.61737/axib9435.
Full textGruber, Verena, Ingrid Peignier, and Charlotte Dubuc. Pratiques et tactiques de vente des concessionnaires automobiles au Québec. CIRANO, October 2023. http://dx.doi.org/10.54932/bryk4403.
Full textFontecave, Marc, and Candel Sébastien. Quelles perspectives énergétiques pour la biomasse ? Académie des sciences, January 2024. http://dx.doi.org/10.62686/1.
Full textDudoit, Alain. Les espaces européens communs de données : une initiative structurante nécessaire et adaptable au Canada. CIRANO, October 2023. http://dx.doi.org/10.54932/ryht5065.
Full text