Corporate cybersecurity [electronic resource] : identifying risks and the bug bounty program / John Jackson.
"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has...
Main Author: | |
---|---|
Language: | English |
Published: |
Hoboken, NJ :
John Wiley & Sons,
2021.
|
Subjects: | |
Online Access: | |
Variant Title: |
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program |
Format: | Electronic eBook |
MARC
LEADER | 00000cam a22000003i 4500 | ||
---|---|---|---|
001 | ebs29920138e | ||
003 | EBZ | ||
006 | m o d |||||| | ||
007 | cr|unu|||||||| | ||
008 | 210506s2021 nju ob 001 0 eng c | ||
020 | |z 9781119782520 | ||
020 | |a 9781119782537 (online) | ||
020 | |a 9781119782544 (online) | ||
020 | |a 9781119782568 (online) | ||
035 | |a (EBZ)ebs29920138e | ||
040 | |a DLC |b eng |d EBZ | ||
042 | |a pcc | ||
050 | 0 | 0 | |a HD30.38 |
100 | 1 | |a Jackson, John |c (Cybersecurity professional), |e author. | |
245 | 1 | 0 | |a Corporate cybersecurity |h [electronic resource] : |b identifying risks and the bug bounty program / |c John Jackson. |
246 | 2 | |a Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program | |
264 | 1 | |a Hoboken, NJ : |b John Wiley & Sons, |c 2021. | |
504 | |a Includes bibliographical references and index. | ||
520 | |a "Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."-- |c Provided by publisher. | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Cyberspace |x Security measures. | |
773 | 0 | |t Wiley Frontlist Obook All English 2021 |d Wiley | |
773 | 0 | |t Wiley Frontlist All Obook 2021 |d Wiley | |
773 | 0 | |t Wiley Obooks 2011 to Present |d Wiley | |
776 | 0 | 8 | |i Print version: |a Jackson, John |t Corporate cybersecurity |d Hoboken, NJ : John Wiley & Sons, 2021 |z 9781119782520 |w (DLC) 2021020794 |
856 | 4 | 0 | |y Access Content Online(from Wiley Frontlist Obook All English 2021) |u https://ezproxy.msu.edu/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568 |z Wiley Frontlist Obook All English 2021: 2021 |
856 | 4 | 0 | |y Access Content Online(from Wiley Frontlist All Obook 2021) |u https://ezproxy.msu.edu/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568 |z Wiley Frontlist All Obook 2021: 2021 |
856 | 4 | 0 | |y Access Content Online(from Wiley Obooks 2011 to Present) |u https://ezproxy.msu.edu/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568 |z Wiley Obooks 2011 to Present: 2021 |