September 2018
Intermediate to advanced
412 pages
11h 12m
English
A typical IIoT application uses many different open source software components, libraries, or frameworks. Identifying and fixing software vulnerabilities in the open source software components and utilizing correct versions of the components are both necessary steps for essential protection against exploitation and a potential breach.
The open source software security assessment helps to do the following:
BLACK DUCK is a tool that is heavily used in enterprises for open source scans. ...