12. Appendix A: build security into and around the pipeline

(This chapter is not available in this edition of the book.)