Libri sul tema "Sécurité de la CI/CD"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-34 libri per l'attività di ricerca sul tema "Sécurité de la CI/CD".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Dingare, Pranoday Pramod. CI/CD Pipeline Using Jenkins Unleashed. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5.
Testo completovan Merode, Henry. Continuous Integration (CI) and Continuous Delivery (CD). Berkeley, CA: Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9228-0.
Testo completoWalter, Panek Bernhard. Synergetisches Marketing I: Grundlagen der Sinneswahrnehmung und der Kommunikation, Gestaltung mit Schrift, Form und Farbe, Reproduktions- und Drucktechnik, CI und CD, Werbepsychologie, Print Production - Drucksorteneinkauf, historischer Überblick Medientechnik. Wien: Wiener Universitätsverlag Facultas (www.facultas.at), 2002.
Cerca il testo completoCI/CD Pipeline Using Jenkins Unleashed: Solutions While Setting up CI/CD Processes. Apress L. P., 2022.
Cerca il testo completoCi vuole orecchio!: Libro + CD-audio 2. Alma Edizioni, 2017.
Cerca il testo completoAnzivino, Katia D'Angelo Filomena. Ci vuole orecchio!: Libro & CD-audio 3. Nuans, 2009.
Cerca il testo completoAnzivino, Katia D'Angelo Filomena. Ci vuole orecchio!: Libro + CD-audio 1. Nuans, 2012.
Cerca il testo completoBuilding CI/CD Systems Using Tekton: Develop Flexible and Powerful CI/CD Pipelines Using Tekton Pipelines and Triggers. de Gruyter GmbH, Walter, 2021.
Cerca il testo completoBuilding CI/CD Systems Using Tekton: Develop Flexible and Powerful CI/CD Pipelines Using Tekton Pipelines and Triggers. Packt Publishing, Limited, 2021.
Cerca il testo completoSécurité maximale, des systèmes et réseaux (1 livre + 1 CD-ROM). CampusPress, 2003.
Cerca il testo completoCherukuri, Sai Sravan. Securing the CI/CD Pipeline: Best Practices for DevSecOps. Bellevue Publishers, 2024.
Cerca il testo completoLaster, Brent. Jenkins X: Creating Automated Cloud-Ready CI/CD Pipelines. O'Reilly Media, Incorporated, 2021.
Cerca il testo completoLotz, Nicholas, e Chris Timberlake. Automating DevOps with GitLab CI/CD Pipelines: Build powerful CI/CD pipelines to verify, secure, and deploy your code using real-life examples. Packt Publishing - ebooks Account, 2023.
Cerca il testo completoLotz, Nicholas, e Chris Timberlake. Automating DevOps with GitLab CI/CD Pipelines: Build Efficient CI/CD Pipelines to Verify, Secure, and Deploy Your Code Using Real-Life Examples. de Gruyter GmbH, Walter, 2023.
Cerca il testo completoLearning GitHub Actions: Automation and Integration of CI/CD with GitHub. O'Reilly Media, Incorporated, 2023.
Cerca il testo completoRadcliffe, Rosalind. Enterprise Bug Busting: From Testing Through CI/CD to Deliver Business Results. BookBaby, 2021.
Cerca il testo completoSwaraj, Nikit. Accelerating DevSecOps on AWS: Create Secure CI/CD Pipelines Using Chaos and AIOps. Packt Publishing, Limited, 2022.
Cerca il testo completoAccelerating DevSecOps on AWS: Create Secure CI/CD Pipelines Using Chaos and AIOps. de Gruyter GmbH, Walter, 2022.
Cerca il testo completoChandrasekara, Chaminda, e Pushpa Herath. Hands-On GitHub Actions: Implement CI/CD with GitHub Action Workflows for Your Applications. Apress L. P., 2021.
Cerca il testo completoContinuous Delivery with Docker and Jenkins,: Create Secure Applications by Building Complete CI/CD Pipelines. de Gruyter GmbH, Walter, 2019.
Cerca il testo completoAtkinson, Brandon. Generic Pipelines Using Docker: The DevOps Guide to Building Reusable, Platform Agnostic CI/CD Frameworks. Apress, 2018.
Cerca il testo completoRafał Leszko. Continuous Delivery with Docker and Jenkins: Create Secure Applications by Building Complete CI/CD Pipelines. Packt Publishing, Limited, 2022.
Cerca il testo completoLaurie, Ben, Peter Laurie e Robert Denn. Apache: The Definitive Guide with CD-ROM. O'Reilly Media, Incorporated, 1999.
Cerca il testo completoContinuous Delivery with Docker and Jenkins, 3rd Edition: Create Secure Applications by Building Complete CI/CD Pipelines. de Gruyter GmbH, Walter, 2022.
Cerca il testo completoLeszko, Rafal. Continuous Delivery with Docker and Jenkins: Create secure applications by building complete CI/CD pipelines, 2nd Edition. Packt Publishing, 2019.
Cerca il testo completoPark, Calvin Sangbin, Lalit Adithya e Samuel Gleske. Jenkins Administrators Guide: Install, Manage and Scale a CI/CD Build and Release System to Accelerate Your Product Lifecycle. Packt Publishing, Limited, 2021.
Cerca il testo completoIT security governance guidebook with security program metrics on CD-ROM. Boca Raton, FL: Auerbach Publications/Taylor & Francis, 2007.
Cerca il testo completoGleske, Sam, e Tracy Miranda. Jenkins Administrator's Guide: Install, Manage, and Scale a CI/CD Build and Release System to Accelerate Your Product Life Cycle. de Gruyter GmbH, Walter, 2021.
Cerca il testo completoLearning Continuous Integration with Jenkins: An End-To-end Guide to Creating Operational, Secure, Resilient, and Cost-effective CI/CD Processes. de Gruyter GmbH, Walter, 2024.
Cerca il testo completoLearning Continuous Integration with Jenkins: An End-To-end Guide to Creating Operational, Secure, Resilient, and Cost-effective CI/CD Processes. Packt Publishing, Limited, 2024.
Cerca il testo completoHands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications Using Jenkins. BPB Publications, 2021.
Cerca il testo completoHack Attacks Testing. New York: John Wiley & Sons, Ltd., 2003.
Cerca il testo completoChirillo, John. Hack Attacks Testing: How to Conduct Your Own Security Audit. Wiley, 2002.
Cerca il testo completoHack attacks testing: How to conduct your own security audit. Indianapolis, Ind: Wiley, 2003.
Cerca il testo completo