Corporate cybersecurity : identifying risks and the bug bounty program / John Jackson.
"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, h...
Saved in:
Online Access: |
Full Text (via EBSCO) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
Hoboken, NJ :
John Wiley & Sons, Inc.,
2022.
|
Subjects: |
Internet
Full Text (via EBSCO)Online
Call Number: |
HD30.38 .J34 2022
|
---|---|
HD30.38 .J34 2022 | Available |