Corporate cybersecurity : (Record no. 29804)

MARC details
000 -LEADER
fixed length control field 02558nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250513145724.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250513b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119782568
024 ## - OTHER STANDARD IDENTIFIER
Source of number or code doi
Standard number or code 10.1002/9781119782568
040 ## - CATALOGING SOURCE
Original cataloging agency TUPM
Language of cataloging eng
Transcribing agency TUPM
Modifying agency TUPM
Description conventions rda
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Jackson, John.
Relator term author.
245 ## - TITLE STATEMENT
Title Corporate cybersecurity :
Remainder of title identifying risks and the bug bounty program /
Statement of responsibility, etc. John Jackson.
Medium ebook
336 ## - CONTENT TYPE
Source rdacontent
337 ## - MEDIA TYPE
Source rdamedia
338 ## - CARRIER TYPE
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographic references and index.
520 ## - SUMMARY, ETC.
Summary, etc. CORPORATE CYBERSECURITY<br/>An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs<br/><br/>A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs.<br/><br/>This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book:<br/>- Contains a much-needed guide aimed at cyber and application security engineers<br/>- Presents a unique defensive guide for understanding and resolving security vulnerabilities<br/>- Encourages research, configuring, and managing programs from the corporate perspective<br/>- Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA<br/><br/>Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ebook
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cybersecurity
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="url">url</a>
Link text Wiley Online Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Reference
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Inventory number Total checkouts Date last seen Uniform resource identifier Price effective from Koha item type
    Library of Congress Classification     TUP Manila Library TUP Manila Library 05/13/2025 00022eb   05/13/2025 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119782568 05/13/2025 Reference



© 2025 Technological University of the Philippines.
All Rights Reserved.

Powered by Koha