Vai al contenuto principale della pagina

Corporate cybersecurity : identifying risks and the bug bounty program / / John Jackson



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Jackson John (Cybersecurity professional) Visualizza persona
Titolo: Corporate cybersecurity : identifying risks and the bug bounty program / / John Jackson Visualizza cluster
Pubblicazione: Hoboken, New Jersey ; ; Chichester, England : , : John Wiley & Sons, Ltd., , [2022]
©2022
Descrizione fisica: 1 online resource (273 pages)
Disciplina: 658.478
Soggetto topico: Business enterprises - Computer networks - Security measures
Penetration testing (Computer security)
Cyberspace - Security measures
Note generali: Includes index.
Sommario/riassunto: "Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."--
Titolo autorizzato: Corporate cybersecurity  Visualizza cluster
ISBN: 1-119-78253-8
1-119-78256-2
1-119-78254-6
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910829852403321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui