Corporate cybersecurity : identifying risks and the bug bounty program / John Jackson.

"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, h...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via EBSCO)
Main Author: Jackson, John (Cybersecurity professional) (Author)
Format: eBook
Language:English
Published: Hoboken, NJ : John Wiley & Sons, Inc., 2022.
Subjects:

Internet

Full Text (via EBSCO)

Online

Holdings details from Online
Call Number: HD30.38 .J34 2022
HD30.38 .J34 2022 Available