CORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/

Includes bibliographical and references

Bibliographic Details
Main Author: Jackson, John, author 237334
Format:
Language:eng
Published: Hoboken, New Jersey : John Wiley & Sons, Inc. ; 2022
Subjects:
_version_ 1796764210357600256
author Jackson, John, author 237334
author_facet Jackson, John, author 237334
author_sort Jackson, John, author 237334
collection OCEAN
description Includes bibliographical and references
first_indexed 2024-03-05T17:06:49Z
format
id KOHA-OAI-TEST:600653
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T17:06:49Z
publishDate 2022
publisher Hoboken, New Jersey : John Wiley & Sons, Inc. ;
record_format dspace
spelling KOHA-OAI-TEST:6006532022-12-06T05:12:03ZCORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/ Jackson, John, author 237334 Hoboken, New Jersey : John Wiley & Sons, Inc. ;2022©2022engIncludes bibliographical and referencesBusiness enterprisesPenetration testing (Computer security)CyberspaceURN:ISBN:9781119782520
spellingShingle Business enterprises
Penetration testing (Computer security)
Cyberspace
Jackson, John, author 237334
CORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/
title CORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/
title_full CORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/
title_fullStr CORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/
title_full_unstemmed CORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/
title_short CORPORATE CYBERSECURITY : IDENTIFYING RISKS AND THE BUG BOUNTY PROGRAM/
title_sort corporate cybersecurity identifying risks and the bug bounty program
topic Business enterprises
Penetration testing (Computer security)
Cyberspace
work_keys_str_mv AT jacksonjohnauthor237334 corporatecybersecurityidentifyingrisksandthebugbountyprogram