Free shipping on orders over $99
Corporate Cybersecurity

Corporate Cybersecurity

Identifying Risks and the Bug Bounty Program

by John Jackson
Hardback
Publication Date: 18/11/2021

Share This Book:

30%
OFF
RRP  $194.95

RRP means 'Recommended Retail Price' and is the price our supplier recommends to retailers that the product be offered for sale. It does not necessarily mean the product has been offered or sold at the RRP by us or anyone else.

$137.35
or 4 easy payments of $34.34 with
afterpay
This item qualifies your order for FREE DELIVERY
CORPORATE CYBERSECURITY

An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs

A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs.

This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book:

  • Contains a much-needed guide aimed at cyber and application security engineers
  • Presents a unique defensive guide for understanding and resolving security vulnerabilities
  • Encourages research, configuring, and managing programs from the corporate perspective
  • Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA

Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

ISBN:
9781119782520
9781119782520
Category:
Data encryption
Format:
Hardback
Publication Date:
18-11-2021
Language:
English
Publisher:
John\Wiley#& Sons, Incorporated
Country of origin:
United States
Dimensions (mm):
244x170x22mm
Weight:
0.54kg
John Jackson

John Jackson is a journalist and writer who has specialised in Second World War Signals Intelligence. He has written The Secret War of Hut 3 and Ultras Arctic War and has edited the declassified Official History of British Sigint, 1914-1945 and Naval Enigma: The History of Hut 8, 1939-1943. He is a volunteer guide at Bletchley Park, where he also demonstrates the Turing-Welchman bombe. He lives at Wing, Befordshire

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Corporate Cybersecurity.