Corporate cybersecurity : identifying risks and the bug bounty program / John Jackson.

"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, h...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via EBSCO)
Main Author: Jackson, John (Cybersecurity professional) (Author)
Format: eBook
Language:English
Published: Hoboken, NJ : John Wiley & Sons, Inc., 2022.
Subjects:
Description
Summary:"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."--
Physical Description:1 online resource : color illustrations
Bibliography:Includes bibliographical references and index.
ISBN:1119782546
9781119782568
1119782562
9781119782537
1119782538
9781119782544
Source of Description, Etc. Note:Description based on online resource; title from digital title page (viewed on January 06, 2022).