Import IT/Information Book from Japan at wholesale prices

  • 日本版

COUPON

Membership Benefits

Handling Fee

100% OFF Coupon Issuing

TOPAll GenresBooksPractical BooksIT/Information
Vendor Profile

Vendor Profile

Shoeisha Co., Ltd.

Address 5 Funamachi Shinjuku-ku Tokyo, JAPAN ZIP:160-0006
Representative Name Kaoru Usui
Annual Revenue closed
No. of Employees 185
Web Site URL
 4.5(3 answers)
Explanation of products
4.4
Information accuracy
4.4
Price and quality
4.2
Delivery situation
4.4
Correspondence
4.4
Inventory accuracy
5.0
Now, cybersecurity is required to properly evaluate software safety!

This book provides a systematic and comprehensive overview of the background of software* supply chain security, threats, and the corresponding government agencies and private organizations.

Safety assessments that are commonplace in the food, pharmaceutical, and automotive industries, which we use daily, are black boxes when it comes to software. It can be said that the correct evaluation of software safety is an act to protect the company and society. In order to evaluate software safety, the cooperation of each stakeholder, including not only software users but also producers and vendors, is essential. This book provides a practical introduction to the approaches and perspectives required for each stakeholder.

In addition, this publication introduces the efforts of the U.S. government and research laboratories to understand software security. Specifically, it covers topics such as the history of software transparency, SBOM (Software Bill of Materials), and certificates. You will learn about software transparency in this book, which is essential for the future of cybersecurity and application security.

*Table of Contents
Chapter 1 Background on Software* Supply Chain Threats
Chapter 2 Existing Approaches - Traditional Vendor Risk Management
Chapter 3 Vulnerability Databases and Scoring Methodologies
Chapter 4 The Rise of the Software Bill of Materials (SBOM)
Chapter 5 Challenges in Software Transparency
Chapter 6 Cloud and Containerization
Chapter 7 Existing and Emerging Guidance in the Private Sector
Chapter 8 Existing and Emerging Guidance in the Public Sector
Chapter 9 Software Transparency in Operational Technology
Chapter 10 Practical Guidance for Suppliers
Chapter 11 Practical Guidance for Users
Chapter 12 Forecasting Software Transparency

SD item code:12981355

Detail Price & Quantity
S1
Originally written by Chris Hughes, Tony Turner, Allan Friedman, and Steve Springett NRI Secure Technologies, Inc.
Chris Hughes、Tony Turner、Allan Friedman、Steve Springett 原著 NRIセキュアテクノロジーズ 翻訳
(187960)
JAN:9784798187969
(187960) JAN:9784798187969

Wholesale Price: Members Only

1 pc /set In Stock
Sign up in order to look into the wholesale price and the product details.
Already a member? Login
Details
Item added on: 2024/12/19
Shipping Date
About 1 week
Dimensions
Format:B5
Number of pages:416
Specifications
Country of manufacture: Japan
Material / component: Format:Book (paper)
Year of manufacture: 2024
Product tag: None

Description

Now, cybersecurity is required to properly evaluate software safety!

This book provides a systematic and comprehensive overview of the background of software* supply chain security, threats, and the corresponding government agencies and private organizations.

Safety assessments that are commonplace in the food, pharmaceutical, and automotive industries, which we use daily, are black boxes when it comes to software. It can be said that the correct evaluation of software safety is an act to protect the company and society. In order to evaluate software safety, the cooperation of each stakeholder, including not only software users but also producers and vendors, is essential. This book provides a practical introduction to the approaches and perspectives required for each stakeholder.

In addition, this publication introduces the efforts of the U.S. government and research laboratories to understand software security. Specifically, it covers topics such as the history of software transparency, SBOM (Software Bill of Materials), and certificates. You will learn about software transparency in this book, which is essential for the future of cybersecurity and application security.

*Table of Contents
Chapter 1 Background on Software* Supply Chain Threats
Chapter 2 Existing Approaches - Traditional Vendor Risk Management
Chapter 3 Vulnerability Databases and Scoring Methodologies
Chapter 4 The Rise of the Software Bill of Materials (SBOM)
Chapter 5 Challenges in Software Transparency
Chapter 6 Cloud and Containerization
Chapter 7 Existing and Emerging Guidance in the Private Sector
Chapter 8 Existing and Emerging Guidance in the Public Sector
Chapter 9 Software Transparency in Operational Technology
Chapter 10 Practical Guidance for Suppliers
Chapter 11 Practical Guidance for Users
Chapter 12 Forecasting Software Transparency

More

Estimated Arrival
Shipping Method Estimated Arrival
Sea Mail From Nov.24th 2025 to Jan.26th 2026
Air Mail From Nov.6th 2025 to Nov.10th 2025
EMS From Nov.5th 2025 to Nov.10th 2025
Pantos Express From Nov.7th 2025 to Nov.12th 2025
DHL From Nov.5th 2025 to Nov.7th 2025
UPS From Nov.5th 2025 to Nov.7th 2025
FedEx From Nov.5th 2025 to Nov.7th 2025
*Some delivery methods may not be available depending on the product or the weight.
*UPS and the UPS logo are trademarks that are used with permission by the owner, United Parcel Service of America, Inc. All rights reserved.
Notes

Some trading conditions may be applicable only in Japan.

This product (book) is subject to the Resale Price Maintenance Program. The law allows the manufacturer (publisher) to specify the sales price. We ask that your company also adhere to the resale price specified by us. In the unlikely event that you fail to do so, we may terminate the transaction. Thank you very much for your understanding and cooperation.
Vender Profile
Categories:
Shoeisha Co., Ltd. Books Practical Books IT/Information