Libros sobre el tema "Sécurité de la CI/CD"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 34 mejores mejores libros para su investigación sobre el tema "Sécurité de la CI/CD".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Dingare, Pranoday Pramod. CI/CD Pipeline Using Jenkins Unleashed. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5.
Texto completovan Merode, Henry. Continuous Integration (CI) and Continuous Delivery (CD). Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9228-0.
Texto completoWalter, Panek Bernhard. Synergetisches Marketing I: Grundlagen der Sinneswahrnehmung und der Kommunikation, Gestaltung mit Schrift, Form und Farbe, Reproduktions- und Drucktechnik, CI und CD, Werbepsychologie, Print Production - Drucksorteneinkauf, historischer Überblick Medientechnik. Wien: Wiener Universitätsverlag Facultas (www.facultas.at), 2002.
Buscar texto completoCI/CD Pipeline Using Jenkins Unleashed: Solutions While Setting up CI/CD Processes. Apress L. P., 2022.
Buscar texto completoCi vuole orecchio!: Libro + CD-audio 2. Alma Edizioni, 2017.
Buscar texto completoAnzivino, Katia D'Angelo Filomena. Ci vuole orecchio!: Libro & CD-audio 3. Nuans, 2009.
Buscar texto completoAnzivino, Katia D'Angelo Filomena. Ci vuole orecchio!: Libro + CD-audio 1. Nuans, 2012.
Buscar texto completoBuilding CI/CD Systems Using Tekton: Develop Flexible and Powerful CI/CD Pipelines Using Tekton Pipelines and Triggers. de Gruyter GmbH, Walter, 2021.
Buscar texto completoBuilding CI/CD Systems Using Tekton: Develop Flexible and Powerful CI/CD Pipelines Using Tekton Pipelines and Triggers. Packt Publishing, Limited, 2021.
Buscar texto completoSécurité maximale, des systèmes et réseaux (1 livre + 1 CD-ROM). CampusPress, 2003.
Buscar texto completoCherukuri, Sai Sravan. Securing the CI/CD Pipeline: Best Practices for DevSecOps. Bellevue Publishers, 2024.
Buscar texto completoLaster, Brent. Jenkins X: Creating Automated Cloud-Ready CI/CD Pipelines. O'Reilly Media, Incorporated, 2021.
Buscar texto completoLotz, Nicholas y Chris Timberlake. Automating DevOps with GitLab CI/CD Pipelines: Build powerful CI/CD pipelines to verify, secure, and deploy your code using real-life examples. Packt Publishing - ebooks Account, 2023.
Buscar texto completoLotz, Nicholas y Chris Timberlake. Automating DevOps with GitLab CI/CD Pipelines: Build Efficient CI/CD Pipelines to Verify, Secure, and Deploy Your Code Using Real-Life Examples. de Gruyter GmbH, Walter, 2023.
Buscar texto completoLearning GitHub Actions: Automation and Integration of CI/CD with GitHub. O'Reilly Media, Incorporated, 2023.
Buscar texto completoRadcliffe, Rosalind. Enterprise Bug Busting: From Testing Through CI/CD to Deliver Business Results. BookBaby, 2021.
Buscar texto completoSwaraj, Nikit. Accelerating DevSecOps on AWS: Create Secure CI/CD Pipelines Using Chaos and AIOps. Packt Publishing, Limited, 2022.
Buscar texto completoAccelerating DevSecOps on AWS: Create Secure CI/CD Pipelines Using Chaos and AIOps. de Gruyter GmbH, Walter, 2022.
Buscar texto completoChandrasekara, Chaminda y Pushpa Herath. Hands-On GitHub Actions: Implement CI/CD with GitHub Action Workflows for Your Applications. Apress L. P., 2021.
Buscar texto completoContinuous Delivery with Docker and Jenkins,: Create Secure Applications by Building Complete CI/CD Pipelines. de Gruyter GmbH, Walter, 2019.
Buscar texto completoAtkinson, Brandon. Generic Pipelines Using Docker: The DevOps Guide to Building Reusable, Platform Agnostic CI/CD Frameworks. Apress, 2018.
Buscar texto completoRafał Leszko. Continuous Delivery with Docker and Jenkins: Create Secure Applications by Building Complete CI/CD Pipelines. Packt Publishing, Limited, 2022.
Buscar texto completoLaurie, Ben, Peter Laurie y Robert Denn. Apache: The Definitive Guide with CD-ROM. O'Reilly Media, Incorporated, 1999.
Buscar texto completoContinuous Delivery with Docker and Jenkins, 3rd Edition: Create Secure Applications by Building Complete CI/CD Pipelines. de Gruyter GmbH, Walter, 2022.
Buscar texto completoLeszko, Rafal. Continuous Delivery with Docker and Jenkins: Create secure applications by building complete CI/CD pipelines, 2nd Edition. Packt Publishing, 2019.
Buscar texto completoPark, Calvin Sangbin, Lalit Adithya y Samuel Gleske. Jenkins Administrators Guide: Install, Manage and Scale a CI/CD Build and Release System to Accelerate Your Product Lifecycle. Packt Publishing, Limited, 2021.
Buscar texto completoIT security governance guidebook with security program metrics on CD-ROM. Boca Raton, FL: Auerbach Publications/Taylor & Francis, 2007.
Buscar texto completoGleske, Sam y Tracy Miranda. Jenkins Administrator's Guide: Install, Manage, and Scale a CI/CD Build and Release System to Accelerate Your Product Life Cycle. de Gruyter GmbH, Walter, 2021.
Buscar texto completoLearning Continuous Integration with Jenkins: An End-To-end Guide to Creating Operational, Secure, Resilient, and Cost-effective CI/CD Processes. de Gruyter GmbH, Walter, 2024.
Buscar texto completoLearning Continuous Integration with Jenkins: An End-To-end Guide to Creating Operational, Secure, Resilient, and Cost-effective CI/CD Processes. Packt Publishing, Limited, 2024.
Buscar texto completoHands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications Using Jenkins. BPB Publications, 2021.
Buscar texto completoHack Attacks Testing. New York: John Wiley & Sons, Ltd., 2003.
Buscar texto completoChirillo, John. Hack Attacks Testing: How to Conduct Your Own Security Audit. Wiley, 2002.
Buscar texto completoHack attacks testing: How to conduct your own security audit. Indianapolis, Ind: Wiley, 2003.
Buscar texto completo