Corporate cybersecurity [electronic resource] : identifying risks and the bug bounty program / John Jackson.
"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has...
Main Author: | Jackson, John (Cybersecurity professional) (Author) |
---|---|
Language: | English |
Published: |
Hoboken, NJ :
John Wiley & Sons,
2021.
|
Subjects: | |
Online Access: | |
Variant Title: |
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program |
Format: | Electronic eBook |