
Vendor Profile
Shoeisha Co., Ltd.
Address | 5 Funamachi Shinjuku-ku Tokyo, JAPAN ZIP:160-0006 |
---|---|
Representative Name | Kaoru Usui |
Annual Revenue | closed |
No. of Employees | 185 |
Web Site URL |
SD item code:12981355
Detail | Price & Quantity | ||
---|---|---|---|
S1 |
Originally written by Chris Hughes, Tony Turner, Allan Friedman, and Steve Springett
NRI Secure Technologies, Inc.
![]()
Chris Hughes、Tony Turner、Allan Friedman、Steve Springett 原著
NRIセキュアテクノロジーズ 翻訳
(187960)
JAN:9784798187969
|
(187960)
JAN:9784798187969
Wholesale Price: Members Only
1 pc /set
In Stock
|
Shipping Date |
---|
About 1 week
|
Dimensions |
---|
Format:B5
Number of pages:416 |
Specifications |
---|
Country of manufacture: Japan
Material / component: Format:Book (paper)
Year of manufacture: 2024
Product tag: None
|
Description
Now, cybersecurity is required to properly evaluate software safety! This book provides a systematic and comprehensive overview of the background of software* supply chain security, threats, and the corresponding government agencies and private organizations. Safety assessments that are commonplace in the food, pharmaceutical, and automotive industries, which we use daily, are black boxes when it comes to software. It can be said that the correct evaluation of software safety is an act to protect the company and society. In order to evaluate software safety, the cooperation of each stakeholder, including not only software users but also producers and vendors, is essential. This book provides a practical introduction to the approaches and perspectives required for each stakeholder. In addition, this publication introduces the efforts of the U.S. government and research laboratories to understand software security. Specifically, it covers topics such as the history of software transparency, SBOM (Software Bill of Materials), and certificates. You will learn about software transparency in this book, which is essential for the future of cybersecurity and application security. *Table of Contents Chapter 1 Background on Software* Supply Chain Threats Chapter 2 Existing Approaches - Traditional Vendor Risk Management Chapter 3 Vulnerability Databases and Scoring Methodologies Chapter 4 The Rise of the Software Bill of Materials (SBOM) Chapter 5 Challenges in Software Transparency Chapter 6 Cloud and Containerization Chapter 7 Existing and Emerging Guidance in the Private Sector Chapter 8 Existing and Emerging Guidance in the Public Sector Chapter 9 Software Transparency in Operational Technology Chapter 10 Practical Guidance for Suppliers Chapter 11 Practical Guidance for Users Chapter 12 Forecasting Software Transparency |
More
Shipping Method | Estimated Arrival |
---|---|
Sea Mail | From Nov.24th 2025 to Jan.26th 2026 |
Air Mail | From Nov.6th 2025 to Nov.10th 2025 |
EMS | From Nov.5th 2025 to Nov.10th 2025 |
Pantos Express | From Nov.7th 2025 to Nov.12th 2025 |
DHL | From Nov.5th 2025 to Nov.7th 2025 |
UPS | From Nov.5th 2025 to Nov.7th 2025 |
FedEx | From Nov.5th 2025 to Nov.7th 2025 |
Some trading conditions may be applicable only in Japan.
This product (book) is subject to the Resale Price Maintenance Program. The law allows the manufacturer (publisher) to specify the sales price. We ask that your company also adhere to the resale price specified by us. In the unlikely event that you fail to do so, we may terminate the transaction. Thank you very much for your understanding and cooperation.
|
Other items from this category:
This book provides a systematic and comprehensive overview of the background of software* supply chain security, threats, and the corresponding government agencies and private organizations.
Safety assessments that are commonplace in the food, pharmaceutical, and automotive industries, which we use daily, are black boxes when it comes to software. It can be said that the correct evaluation of software safety is an act to protect the company and society. In order to evaluate software safety, the cooperation of each stakeholder, including not only software users but also producers and vendors, is essential. This book provides a practical introduction to the approaches and perspectives required for each stakeholder.
In addition, this publication introduces the efforts of the U.S. government and research laboratories to understand software security. Specifically, it covers topics such as the history of software transparency, SBOM (Software Bill of Materials), and certificates. You will learn about software transparency in this book, which is essential for the future of cybersecurity and application security.
*Table of Contents
Chapter 1 Background on Software* Supply Chain Threats
Chapter 2 Existing Approaches - Traditional Vendor Risk Management
Chapter 3 Vulnerability Databases and Scoring Methodologies
Chapter 4 The Rise of the Software Bill of Materials (SBOM)
Chapter 5 Challenges in Software Transparency
Chapter 6 Cloud and Containerization
Chapter 7 Existing and Emerging Guidance in the Private Sector
Chapter 8 Existing and Emerging Guidance in the Public Sector
Chapter 9 Software Transparency in Operational Technology
Chapter 10 Practical Guidance for Suppliers
Chapter 11 Practical Guidance for Users
Chapter 12 Forecasting Software Transparency