Corporate cybersecurity : identifying risks and the bug bounty program

"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, h...

Full description

Saved in:
Bibliographic Details
Main Author Jackson, John (Cybersecurity professional) (Author)
Format Electronic eBook
LanguageEnglish
Published Hoboken, NJ : John Wiley & Sons, Inc., 2022.
Subjects
Online AccessPlný text

Cover

Loading…