Corporate cybersecurity : identifying risks and the bug bounty program

"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, h...

Full description

Saved in:
Bibliographic Details
Main Author: Jackson, John (Cybersecurity professional), (Author)
Format: eBook
Language: English
Published: Hoboken, NJ : John Wiley & Sons, Inc., 2022.
Subjects:
ISBN: 9781119782568
9781119782537
9781119782544
9781119782520
Physical Description: 1 online zdroj : ilustrace

Cover

Table of contents

Description
Summary: "Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."-- Resumé vydavatel
Bibliography: Obsahuje bibliografické odkazy a index.
ISBN: 9781119782568
9781119782537
9781119782544
9781119782520
Access: Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity