LEADER 02296nam 2200481 450 001 9910829852403321 005 20230629225933.0 010 $a1-119-78253-8 010 $a1-119-78256-2 010 $a1-119-78254-6 035 $a(CKB)4940000000619475 035 $a(MiAaPQ)EBC6789349 035 $a(Au-PeEL)EBL6789349 035 $a(OCoLC)1251739943 035 $a(EXLCZ)994940000000619475 100 $a20220713d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCorporate cybersecurity $eidentifying risks and the bug bounty program /$fJohn Jackson 210 1$aHoboken, New Jersey ;$aChichester, England :$cJohn Wiley & Sons, Ltd.,$d[2022] 210 4$dİ2022 215 $a1 online resource (273 pages) 300 $aIncludes index. 311 $a1-119-78252-X 330 $a"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."--$cProvided by publisher. 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aPenetration testing (Computer security) 606 $aCyberspace$xSecurity measures 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aPenetration testing (Computer security) 615 0$aCyberspace$xSecurity measures. 676 $a658.478 700 $aJackson$b John$c(Cybersecurity professional),$0366057 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910829852403321 996 $aCorporate cybersecurity$94033028 997 $aUNINA