LEADER 00732nam0 2200253 450 001 000022585 005 20090204150812.0 010 $a3-540-10757-6 100 $a20090204d1981----km-y0itay50------ba 101 0 $aeng 102 $aDE 105 $ay-------001yy 200 1 $aThree concepts of time$fKenneth G. Denbigh 210 $aBerlin$cSpringer$d1981 215 $a180 p.$d25 cm 500 10$aThree concepts of time$945468 610 1 $aTempo$aConcetto$aStoria$aSec. 17.-20. 676 $a501$v21 700 1$aDenbigh,$bKenneth G.$0623 801 0$aIT$bUNIPARTHENOPE$c200900204$gRICA$2UNIMARC 912 $a000022585 951 $aS 501/45$bS A, 1214$cDSA$d2009 996 $aThree concepts of time$945468 997 $aUNIPARTHENOPE LEADER 00880nam0-22003251i-450- 001 990003256440403321 005 20001010 010 $a0-416-91950-2 035 $a000325644 035 $aFED01000325644 035 $a(Aleph)000325644FED01 035 $a000325644 100 $a20000920d1987----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aPOPULATION AND DEVELOPMENT IN THE THIRD WORLD 205 $a1 210 $aLondon$cAllan and Anne Findlay$d1987 215 $app. 84 610 0 $aGeografia della Popolazione 676 $a040.007 700 1$aFindlay,$bAllan M.$f<1954- >$0243416 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003256440403321 952 $a040.007.FIN$b750$fDECGE 959 $aDECGE 996 $aPOPULATION AND DEVELOPMENT IN THE THIRD WORLD$9449740 997 $aUNINA DB $aING01 LEADER 02296nam 2200481 450 001 9910829852403321 005 20230629225933.0 010 $a1-119-78253-8 010 $a1-119-78256-2 010 $a1-119-78254-6 035 $a(CKB)4940000000619475 035 $a(MiAaPQ)EBC6789349 035 $a(Au-PeEL)EBL6789349 035 $a(OCoLC)1251739943 035 $a(EXLCZ)994940000000619475 100 $a20220713d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCorporate cybersecurity $eidentifying risks and the bug bounty program /$fJohn Jackson 210 1$aHoboken, New Jersey ;$aChichester, England :$cJohn Wiley & Sons, Ltd.,$d[2022] 210 4$dİ2022 215 $a1 online resource (273 pages) 300 $aIncludes index. 311 $a1-119-78252-X 330 $a"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."--$cProvided by publisher. 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aPenetration testing (Computer security) 606 $aCyberspace$xSecurity measures 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aPenetration testing (Computer security) 615 0$aCyberspace$xSecurity measures. 676 $a658.478 700 $aJackson$b John$c(Cybersecurity professional),$0366057 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910829852403321 996 $aCorporate cybersecurity$94033028 997 $aUNINA