Gotowa bibliografia na temat „CI/CD Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „CI/CD Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "CI/CD Security"
Ho-Dac, Hung, i Van-Len Vo. "An Approach to Enhance CI/CD Pipeline with Open-Source Security Tools". European Modern Studies Journal 8, nr 3 (30.07.2024): 408–13. http://dx.doi.org/10.59573/emsj.8(3).2024.30.
Pełny tekst źródłaSingh, Nikhil. "CI/CD Pipeline for Web Applications". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 5218–26. http://dx.doi.org/10.22214/ijraset.2023.52867.
Pełny tekst źródłaAmeta, Upasana, i Ruchi Vyas. "Application Deployment Automation by Streamlining CI/CD Pipelines". Asian Journal of Engineering and Applied Technology 12, nr 1 (24.05.2023): 23–27. http://dx.doi.org/10.51983/ajeat-2023.12.1.3598.
Pełny tekst źródłaBhardwaj, Arvind Kumar, P. K. Dutta i Pradeep Chintale. "Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines". Babylonian Journal of Networking 2024 (20.08.2024): 162–70. http://dx.doi.org/10.58496/bjn/2024/016.
Pełny tekst źródłaThatikonda, Vamsi Krishna. "Beyond the Buzz: A Journey Through CI/CD Principles and Best Practices". European Journal of Theoretical and Applied Sciences 1, nr 5 (1.09.2023): 334–40. http://dx.doi.org/10.59324/ejtas.2023.1(5).24.
Pełny tekst źródłaMuñoz, Antonio, Aristeidis Farao, Jordy Ryan Casas Correia i Christos Xenakis. "P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements". Information 12, nr 9 (31.08.2021): 357. http://dx.doi.org/10.3390/info12090357.
Pełny tekst źródłaShanmukhi, Bhaskara Sahithi. "Implementing and Using CI/CD: Addressing Key Challenges Faced by Software Developers". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 008 (22.08.2024): 1–3. http://dx.doi.org/10.55041/ijsrem37128.
Pełny tekst źródłaPhani Monogya Katikireddi, Prudhvi Singirikonda i Yeshwanth Vasa. "REVOLUTIONIZING DEVOPS WITH QUANTUM COMPUTING: ACCELERATING CI/CD PIPELINES THROUGH ADVANCED COMPUTATIONAL TECHNIQUES". Innovative Research Thoughts 7, nr 2 (30.06.2021): 97–103. http://dx.doi.org/10.36676/irt.v7.i2.1482.
Pełny tekst źródłaJayaprakash Malgund, Spoorthi, i Dr Sowmyarani C N. "AUTOMATING DEPLOYMENTS OF THE LATEST APPLICATION VERSION USING CI-CD WORKFLOW". International Journal of Engineering Applied Sciences and Technology 7, nr 5 (1.09.2022): 99–103. http://dx.doi.org/10.33564/ijeast.2022.v07i05.017.
Pełny tekst źródłaChandrasekhara Mokkapati, Shalu Jain i Pandi Kirupa Gopalakrishna Pandian. "Implementing CI/CD in Retail Enterprises: Leadership Insights for Managing Multi-Billion Dollar Projects". Innovative Research Thoughts 9, nr 1 (30.03.2023): 391–405. http://dx.doi.org/10.36676/irt.v9.i1.1458.
Pełny tekst źródłaRozprawy doktorskie na temat "CI/CD Security"
Persson, Simone. "List of Security Concerns within Continuous Software Evolution". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254881.
Pełny tekst źródłaI en tid då mängden data som samlas in om individer ökar i ohindrad takt, blir frågor om integritet och informationssäkerhet viktigare än någonsin. Kraven på snabb utveckling och förändring präglar även metoderna för mjukvaruutveckling. Produkter och tjänster måste konstant anpassas efter kundernas önskemål för att förbli relevant på marknaden. Arbetssätt och teknologier har utvecklats över tid för att möjliggöra mjukvara som uppdateras kontinuerligt. Konstant föränderlig mjukvara leder dock till oro för kvalitén och säkerheten av uppdateringarna. Den här uppsatsen är en litteraturstudie som undersöker utmaningarna att säkerställa säkerhet för mjukvara som uppdateras kontinuerligt. Problemet som löses genom studien är den saknade helhetsbilden av säkerhetsproblem vid kontinuerligt föränderlig mjukvara. Resultatet sammanfattas i en checklista för områden som väcker oro för säkerheten vid arbetssätt som tillåter kontinuerliga uppdateringar i moln-miljöer. Studien visar att leverera säkra lösningar kontinuerligt är en svår uppgift. Det kräver nära samarbete mellan team som sköter olika delar av mjukvaruutveckling. Detta fordrar vida kompetenser som inkluderar förståelse av varandras arbete. Att finna personal med tillräckligt vida kompetenser uppskattas vara problematiskt.
Moriconi, Florent. "Amélioration du cycle de développement logiciel via des approches basées sur les données". Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS164.
Pełny tekst źródłaThis thesis explores data-driven approaches for automated root cause analysis of CI/CD build failures, focusing on identifying non-deterministic failures, locating root cause messages in build logs, and characterizing CI/CD systems' performance and security. Grounded on public and industrial datasets, we explore CI/CD workflow properties, such as execution times and failure patterns. The research introduces the use of Natural Language Processing (NLP) and Knowledge Graphs Embeddings (KGE) for classifying build failures with a 94% accuracy. Additionally, we introduce ChangeMyMind, a new method based on Recurrent Neural Networks (RNNs) to accurately locate root cause messages in build logs without prior labeling of root cause messages. We propose X-Ray-TLS, a generic and transparent approach for inspecting TLS-encrypted network traffic in CI/CD environments. Finally, the thesis also revisits security vulnerabilities in CI/CD systems, demonstrating the potential for undetectable long-term compromises. This work has resulted in three publications and two under-review submissions, contributing significantly to CI/CD system analysis and optimization
Brás, André Emanuel Raínho. "Container security in CI/CD pipelines". Master's thesis, 2021. http://hdl.handle.net/10773/31292.
Pełny tekst źródłaA ascensão da estratégia DevOps e a transição de uma economia de produto para uma economia de serviços conduziu a mudanças significativas no paradigma do ciclo de vida do desenvolvimento de software, entre as quais o abandono do modelo em cascata em favor de métodos ágeis. Uma vez que o DevOps é parte integrante de um método ágil, permite-nos monitorizar as versões actuais, recebendo feedback constante dos clientes, e melhorando as próximas versões de software. Apesar do seu extraordinário desenvolvimento, o DevOps ainda apresenta limitações relativas à segurança, que necessita de ser incluída nas pipelines de integração contínua ou implantação contínua (CI/CD) utilizadas no desenvolvimento de software. A adopção em massa de serviços na nuvem e software aberto, a ampla difusão de contentores e respectiva orquestração bem como das arquitecturas de micro-serviços, quebraram assim todos os modelos convencionais de desenvolvimento de software. Devido a estas novas tecnologias, a preparação e expedição de novo software é hoje em dia feita em curtos períodos temporais e ficando disponível quase instantaneamente a utilizadores em todo o mundo. Face a estes fatores, a abordagem habitual que adiciona segurança ao final do ciclo de vida do desenvolvimento de software está a tornar-se obsoleta, sendo crucial adotar metodologias DevSecOps ou SecDevOps, injetando a segurança mais cedo nos processos de desenvolvimento de software e impedindo que defeitos ou problemas de segurança fluam para os ambientes de produção. O objectivo desta dissertação é reduzir o impacto de vulnerabilidades em micro-serviços através do exame das respectivas imagens e contentores por um conjunto flexível e adaptável de ferramentas de análise que funcionam em pipelines CI/CD dedicadas. Esta abordagem pretende fornecer uma coleção limpa e segura de micro-serviços para posteriormente serem lançados em ambientes de produção na nuvem. Para atingir este objectivo, desenvolvemos uma solução que permite programar e orquestrar uma bateria de testes. Existe um formulário onde podemos seleccionar várias ferramentas de análise de segurança, e a solução executa este conjunto de testes de uma forma controlada de acordo com as dependências definidas. Para demonstrar a eficácia da solução, programamos um conjunto de testes para diferentes cenários, definindo as pipelines de análise de segurança para incorporar várias ferramentas. Finalmente, mostraremos ferramentas de segurança a funcionar localmente, que posteriormente integradas na nossa solução devolvem os mesmos resultados.
Mestrado em Engenharia Informática
Zhygulskyy, Mykyta. "AUTOMATED, SCHEDULED AND CI /CD WEB INJECTION". Master's thesis, 2021. http://hdl.handle.net/10400.8/5786.
Pełny tekst źródłaKsiążki na temat "CI/CD Security"
Cherukuri, Sai Sravan. Securing the CI/CD Pipeline: Best Practices for DevSecOps. Bellevue Publishers, 2024.
Znajdź pełny tekst źródłaCzęści książek na temat "CI/CD Security"
Dingare, Pranoday Pramod. "Managing Security with Jenkins". W CI/CD Pipeline Using Jenkins Unleashed, 55–67. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7508-5_7.
Pełny tekst źródłaDakic, Vedran, Jasmin Redzepagic i Matej Basic. "CI/CD Toolset Security". W DAAAM Proceedings, 0161–64. DAAAM International Vienna, 2022. http://dx.doi.org/10.2507/33rd.daaam.proceedings.022.
Pełny tekst źródłaBobbert, Yuri, i Maria Chtepen. "Problems of CI/CD and DevOps on Security Compliance". W Strategic Approaches to Digital Platform Security Assurance, 256–85. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch007.
Pełny tekst źródłaNanda, Ashok Kumar, Abhishek Sharma, P. John Augustine, B. Rex Cyril, Venneti Kiran i Boopathi Sampath. "Securing Cloud Infrastructure in IaaS and PaaS Environments". W Improving Security, Privacy, and Trust in Cloud Computing, 1–33. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1431-9.ch001.
Pełny tekst źródłaBobbert, Yuri, i Maria Chtepen. "Research Findings in the Domain of CI/CD and DevOps on Security Compliance". W Strategic Approaches to Digital Platform Security Assurance, 286–307. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch008.
Pełny tekst źródłaBobbert, Yuri, i Maria Chtepen. "Findings and Core Practices in the Domain of CI/CD and DevOps on Security Compliance". W Strategic Approaches to Digital Platform Security Assurance, 308–13. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7367-9.ch009.
Pełny tekst źródłaEigenbrode, Shelbee, i Suheil Nassar. "Design and Implementation of Service Management in DevOps Enabled Cloud Computing Models". W Handbook of Research on End-to-End Cloud Computing Architecture Design, 326–47. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0759-8.ch014.
Pełny tekst źródłaStreszczenia konferencji na temat "CI/CD Security"
Shevchuk, Ruslan, Mikolaj Karpinski, Mykhailo Kasianchuk, Ihor Yakymenko, Andriy Melnyk i Roman Tykhyi. "Software for Improve the Security of Kubernetes-based CI/CD Pipeline". W 2023 13th International Conference on Advanced Computer Information Technologies (ACIT). IEEE, 2023. http://dx.doi.org/10.1109/acit58437.2023.10275654.
Pełny tekst źródłaMarandi, Manohar, A. Bertia i Salaja Silas. "Implementing and Automating Security Scanning to a DevSecOps CI/CD Pipeline". W 2023 World Conference on Communication & Computing (WCONF). IEEE, 2023. http://dx.doi.org/10.1109/wconf58270.2023.10235015.
Pełny tekst źródłaRangnau, Thorsten, Remco v. Buijtenen, Frank Fransen i Fatih Turkmen. "Continuous Security Testing: A Case Study on Integrating Dynamic Security Testing Tools in CI/CD Pipelines". W 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC). IEEE, 2020. http://dx.doi.org/10.1109/edoc49727.2020.00026.
Pełny tekst źródłaPutra, Agung Maulana, i Herman Kabetta. "Implementation of DevSecOps by Integrating Static and Dynamic Security Testing in CI/CD Pipelines". W 2022 IEEE International Conference of Computer Science and Information Technology (ICOSNIKOM). IEEE, 2022. http://dx.doi.org/10.1109/icosnikom56551.2022.10034883.
Pełny tekst źródłaRaporty organizacyjne na temat "CI/CD Security"
D'Onofrio, Dominic. CI/CD Pipeline and DevSecOps Integration for Security and Load Testing. Office of Scientific and Technical Information (OSTI), sierpień 2023. http://dx.doi.org/10.2172/2430395.
Pełny tekst źródłaChandramouli, Ramaswamy. Strategies for Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.
Pełny tekst źródła