|
|
|||
|
||||
OverviewImagine it's 2:00 AM on a Saturday. Your phone vibrates. It isn't a routine server crash. Your Security Operations Center has just detected that your official, highly trusted deployment pipeline pushed malware to thousands of production nodes. You didn't write the malware. Your developers didn't approve it. An Advanced Persistent Threat (APT) silently hijacked your CI runner, injected a backdoor during the compilation phase, and mathematically signed it with your official keys. By the time the alert fires, it is already too late. This isn't a Hollywood script. This is exactly how the SolarWinds, Codecov, and Log4j breaches unfolded. Attackers have realized that hacking the factory is far more devastating than hacking the end product. I wrote this book to ensure you never have to wake up to that 2:00 AM nightmare. What's insideIn this book, we move past theory and dive straight into the trenches. You will learn how to: Implement Zero Trust pipelines using ephemeral, isolated build runners. Neutralize dependency confusion and typosquatting attacks in your package managers. Generate non-falsifiable provenance using the SLSA framework and keyless signing (Sigstore). Deploy Policy as Code to mathematically block tampered software from reaching production. Leverage AI and automated self-healing to detect and quarantine pipeline intrusions in real-time. Who it's meant forI wrote this specifically for DevOps engineers, Security Architects, Site Reliability Engineers (SREs), and Engineering Leaders. If you are responsible for writing the code, building the automation, or defending the cloud infrastructure, this book is your new survival guide. You don't need a PhD in cryptography-just a solid grasp of CI/CD concepts and a desire to stop the bad guys in their tracks. The adversaries are not waiting for you to get ready; they are actively probing your toolchains right now. Don't wait for a front-page breach to realize your build environment was left unguarded. Take control of your software factory. Secure your pipeline, protect your customers, and sleep soundly at night. Grab your copy of Software Supply Chain Defense today and start building the ultimate digital fortress. Full Product DetailsAuthor: John J TimmsPublisher: Independently Published Imprint: Independently Published Dimensions: Width: 17.00cm , Height: 1.10cm , Length: 24.40cm Weight: 0.345kg ISBN: 9798259249660Pages: 212 Publication Date: 28 April 2026 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||