(This chapter is not available in this edition of the book.)
Up next
12. Appendix A: build security into and around the pipeline