LEADER 01070nam0-22003611i-450- 001 990002569770403321 005 20090615164736.0 035 $a000256977 035 $aFED01000256977 035 $a(Aleph)000256977FED01 035 $a000256977 100 $a20030910d1963----km-y0itay50------ba 101 0 $aeng 200 1 $aMathematics of Finance$e500 solved problems$fFrank Ayres 210 $aNew York$cMcGraw-Hill$d1963 215 $a230 p.$d28 cm 225 1 $aSchaum's outline series 517 1 $aSchaum's outline of theory and problems of mathematics of finance 610 0 $aMatematica finanziaria$aEsercizi 676 $a510 700 1$aAyres,$bFrank$f<1901- >$0110 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990002569770403321 952 $aMXXVII-A-168$b181$fMAS 952 $aMXXVII-A-212$b762$fMAS 952 $aMXXVII-A-169$b1789$fMAS 952 $aMXXVII-A-213$b763$fMAS 952 $a04 010-22$bIRC 563/L$fDINCH 959 $aMAS 959 $aDINCH 996 $aMathematics of finance$9188455 997 $aUNINA LEADER 02296nam 2200481 450 001 9910829852403321 005 20230629225933.0 010 $a1-119-78253-8 010 $a1-119-78256-2 010 $a1-119-78254-6 035 $a(CKB)4940000000619475 035 $a(MiAaPQ)EBC6789349 035 $a(Au-PeEL)EBL6789349 035 $a(OCoLC)1251739943 035 $a(EXLCZ)994940000000619475 100 $a20220713d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCorporate cybersecurity $eidentifying risks and the bug bounty program /$fJohn Jackson 210 1$aHoboken, New Jersey ;$aChichester, England :$cJohn Wiley & Sons, Ltd.,$d[2022] 210 4$d©2022 215 $a1 online resource (273 pages) 300 $aIncludes index. 311 $a1-119-78252-X 330 $a"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."--$cProvided by publisher. 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aPenetration testing (Computer security) 606 $aCyberspace$xSecurity measures 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aPenetration testing (Computer security) 615 0$aCyberspace$xSecurity measures. 676 $a658.478 700 $aJackson$b John$c(Cybersecurity professional),$0366057 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910829852403321 996 $aCorporate cybersecurity$94033028 997 $aUNINA LEADER 01409nam0 22003491i 450 001 UON00306995 005 20231205104037.642 010 $a978-90-272-3235-9$b2006 010 $a978-90-272-3257-1$b2008 100 $a20080123g20062008 |0itac50 ba 101 $aeng 102 $aNL 105 $a|||| 1|||| 200 1 $aHandbook of pragmatics. Installment 2006, 2008$fJan-Ola Ostman, Jef Verschueren$gin collaboration with Eline Versluys 205 $aAmsterdam$gPhiladelphia : J. Benjamins 210 $a2 vol. in 1$a25 cm 215 $aIn raccoglitore a fogli mobili. 606 $aLinguaggio$xSociologia$xManuali$3UONC093352$2FI 606 $aPragmatica$xManuali$3UONC085806$2FI 620 $aUS$dPhiladelphia$3UONL000152 620 $aNL$dAmsterdam$3UONL001817 676 $a306.44$cCultura e istituzioni. Linguaggio$v21 700 1$aÖSTMAN$bJan-Ola$3UONV128932$0436528 701 1$aVERSCHUEREN$bJef$3UONV128931$0158632 702 1$aVERSLUYS$bEline$3UONV179723 712 $aJohn Benjamins Publishing Company$3UONV256739$4650 801 $aIT$bSOL$c20250704$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00306995 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI Angl VIII 0430 e $eSI DA 2157 7 0430 e 996 $aHandbook of pragmatics$91376288 997 $aUNIOR