
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente
Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has become mission critical. This book offers a comprehensive guide to understanding and implementing next-generation strategies that protect these intricate networks from most pressing risks.
This book begins by laying the foundation of modern software supply chain security, exploring the shifting threat landscape and key technologies driving the future. Delve into the heart of how AI and IoT are transforming supply chain protection through advanced predictive analytics, real-time monitoring, and intelligent automation. Discover how integrating application security practices within your supply chain can safeguard critical systems and data.
Through real-world case studies and practical insights, learn how to build resilient supply chains equipped to defend against sophisticated attacks like dependency confusion, backdoor injection, and adversarial manipulation. Whether you’re managing a global software operation or integrating DevSecOps into your CI/CD pipelines, this book offers actionable advice for fortifying your supply chain end-to-end.
You Will:
Who Is This Book For
The target audience for a book would typically include professionals and individuals with an interest or involvement in cloud-native application development and DevOps practices. It will cover fundamentals of cloud-native architecture, DevOps principles, and provide practical guidance for building and maintaining scalable and reliable applications in a cloud-native environment. The book's content will cater to beginner to intermediate level professionals seeking in-depth insights.
PART I: FOUNDATION OF NEXT-GEN SUPPLY CHAIN SECURITY.- Chapter 1: The New Era of Supply Chain Security.- Chapter 2: Key Technologies Shaping the Future.- PART II: APPLICATION SECURITY IN THE SUPPLY CHAIN.- Chapter 3: The Anatomy of Supply Chain Applications.- Chapter 4: Application Security Best Practices.- Chapter 5: DevSecOps in Supply Chain Management.- PART III: LEVERAGING AI AND IOT FOR SECURITY.- Chapter 6: AI-Powered Threat Detection and Response.- Chapter 7: IoT Security and Monitoring.- PART IV: CASE STUDIES AND PRACTICAL IMPLEMENTATION.- Chapter 8: Case Studies in Next-Gen Supply Chain Security.- Chapter 9: Implementing Next-Gen Security in Your Supply Chain.- PART V: FUTURE TRENDS AND CHALLENGES.- Chapter 10: Future Trends in Supply Chain Security.- Chapter 11: Navigating Emerging Challenges.
Aamiruddin Syed is a seasoned security professional specializing in DevSecOps, cloud security, supply chain security, and penetration testing. With dual master’s degrees in Cybersecurity from Northeastern University and Jadavpur University, he excels in automating security within CI/CD pipelines and embedding security practices in cloud infrastructure.
A recognized security advocate, Aamiruddin is a frequent speaker at industry conferences, including DEFCON and chairs technical conferences like ICCTICT. His work focuses on integrating security seamlessly into engineering processes, securing products across diverse industries, including manufacturing. He is also an author on supply chain security and a judge for the Globee Cybersecurity Awards.
Beyond his professional endeavours, Aamiruddin contributes to open-source security tools and actively shares knowledge through his podcast, CyberGPT Pulse, and hands-on engagements like TryHackMe challenges.


Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.