Corporate cybersecurity : identifying risks and the bug bounty program
"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, h...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Hoboken, NJ :
John Wiley & Sons, Inc.,
2022.
|
Subjects: | |
ISBN: | 9781119782568 9781119782537 9781119782544 9781119782520 |
Physical Description: | 1 online zdroj : ilustrace |
LEADER | 03517cam a2200673 i 4500 | ||
---|---|---|---|
001 | 107961 | ||
003 | CZ-ZlUTB | ||
005 | 20240914114813.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 210506t20222022njua fo 001 0 eng | ||
999 | |c 107961 |d 107961 | ||
020 | |a 9781119782568 |q (electronic book) | ||
020 | |a 9781119782537 |q (electronic book) | ||
020 | |a 9781119782544 |q (electronic bk.) | ||
020 | |z 9781119782520 |q (hardcover) | ||
024 | 7 | |a 10.1002/9781119782568 |2 doi | |
035 | |a (OCoLC)1251739943 | ||
040 | |a DLC |b eng |e rda |c DLC |d OCLCO |d OCLCF |d DG1 |d IEEEE |d OCLCO |d YDX |d OCL |d IEEEE |d OCLCO |d N$T |d OCLCQ | ||
042 | |a pcc | ||
072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |2 Konspekt |9 23 | |
080 | |a 334.72 |2 MRF | ||
080 | |a 004.946(1) |2 MRF | ||
080 | |a 351.78:004.7 |2 MRF | ||
080 | |a 004.7.056 |2 MRF | ||
080 | |a 004.056.53 |2 MRF | ||
080 | |a (0.034.2:08) |2 MRF | ||
080 | |a (048.8) |2 MRF | ||
100 | 1 | |a Jackson, John |c (Cybersecurity professional), |e author. | |
245 | 1 | 0 | |a Corporate cybersecurity : |b identifying risks and the bug bounty program / |c John Jackson. |
264 | 1 | |a Hoboken, NJ : |b John Wiley & Sons, Inc., |c 2022. | |
264 | 4 | |c ©2022 | |
300 | |a 1 online zdroj : |b ilustrace | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
504 | |a Obsahuje bibliografické odkazy a index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty univerzity | ||
520 | |a "Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."-- Resumé vydavatel | ||
590 | |a John Wiley and Sons |b Wiley Online Library: Complete oBooks | ||
650 | 0 | 7 | |a podniky |7 ph115764 |2 czenas |
650 | 0 | 7 | |a kyberprostor |7 ph114801 |2 czenas |
650 | 0 | 7 | |a kybernetická bezpečnost |7 ph716242 |2 czenas |
650 | 0 | 7 | |a zabezpečení počítačových sítí |7 ph127513 |2 czenas |
650 | 0 | 7 | |a penetrační testy (počítačová bezpečnost) |7 ph888574 |2 czenas |
650 | 0 | 9 | |a business enterprises |2 eczenas |
650 | 0 | 9 | |a cyberspace |2 eczenas |
650 | 0 | 9 | |a cyber security |2 eczenas |
650 | 0 | 9 | |a computer network security |2 eczenas |
650 | 0 | 9 | |a penetration tests (computer security) |2 eczenas |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 7 | |a monografie |7 fd132842 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
655 | 9 | |a monographs |2 eczenas | |
776 | 0 | 8 | |i Print version: |a Jackson, John |t Corporate cybersecurity |d Hoboken, NJ : John Wiley & Sons, 2021 |z 9781119782520 |w (DLC) 2021020794 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568 |y Plný text |
942 | |2 udc | ||
992 | |c EBOOK-TN |c WILEY | ||
993 | |x NEPOSILAT |y EIZ |