Get Free Shipping on orders over $79
Corporate Cybersecurity : Identifying Risks and the Bug Bounty Program - John Jackson

Corporate Cybersecurity

Identifying Risks and the Bug Bounty Program

By: John Jackson

eText | 20 October 2021 | Edition Number 1

At a Glance

eText


$171.59

or 4 interest-free payments of $42.90 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

CORPORATE CYBERSECURITY

An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs

A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs.

This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book:

  • Contains a much-needed guide aimed at cyber and application security engineers
  • Presents a unique defensive guide for understanding and resolving security vulnerabilities
  • Encourages research, configuring, and managing programs from the corporate perspective
  • Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA

Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

on
Desktop
Tablet
Mobile

More in Data Encryption

The Book of Mitigations - Felipe Reitz

eBOOK

Cybersecurity Explained - Anders Askåsen

eBOOK