null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Identity Security for Software Development (Best Practices That Every Developer Must Know)

List Price: $59.99
SKU:
9781098158033
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    John Walsh, Uzi Ailon, Matt Barker
    Format:
    Paperback
    Pages:
    205
    Publisher:
    O'Reilly Media (June 10, 2025)
    Language:
    English
    ISBN-13:
    9781098158033
    ISBN-10:
    1098158032
    Dimensions:
    7" x 9.19"
    File:
    TWO RIVERS-PERSEUS-Metadata_Only_Perseus_Distribution_Customer_Group_Metadata_20260209163242-20260209.xml
    Folder:
    TWO RIVERS
    List Price:
    $59.99
    Country of Origin:
    United States
    Pub Discount:
    60
    Case Pack:
    19
    As low as:
    $51.59
    Publisher Identifier:
    P-PER
    Discount Code:
    C
    Imprint:
    O'Reilly Media
    Weight:
    12oz
  • Overview

    Maintaining secrets, credentials, and machine identities in secure ways is an important, though often overlooked, aspect of secure software development. DevOps security often addresses vulnerabilities, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches. That's where an identity security strategy integrated in your code, infrastructure, and environments from day one can help.

    In this practical book, authors John Walsh, Uzi Ailon, and Matt Barker provide conceptual frameworks, technology overviews, and useful code snippets to bridge the gap between development, IT, and security to integrate robust identity security across apps, CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, process automation, IoT, and more. You'll learn:

    • What developers need to know about managing secrets and identity to build safer apps
    • What machine identities, secrets, and credentials are—and how to secure them
    • How to secure the software supply chain to build safer apps
    • How identity security fits into modern software development practices