Corporate cybersecurity : identifying risks and the bug bounty program /

"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, h...

Full description

Saved in:
Bibliographic Details
Main Author: Jackson, John (Cybersecurity professional) (Author)
Format: Electronic eBook
Language:English
Published: Hoboken, NJ : John Wiley & Sons, Inc., 2022.
Subjects:
Online Access:CONNECT