Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program » MIRLIB.RU - ТВОЯ БИБЛИОТЕКА
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program
/
Corporate Cybersecurity: Identifying Risks and the Bug Bounty ProgramНазвание: Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program
Автор: John Jackson
Издательство: Wiley-IEEE Press
Год: 2022
Страниц: 224
Язык: английский
Формат: epub
Размер: 36.6 MB

An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs.

A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs.

This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book:

Contains a much-needed guide aimed at cyber and application security engineers
Presents a unique defensive guide for understanding and resolving security vulnerabilities
Encourages research, configuring, and managing programs from the corporate perspective
Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA

Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

Contents:

Foreword
Part 1 Bug Bounty Overview
1 The Evolution of Bug Bounty Programs
Part 2 Evaluating Programs
2 Assessing Current Vulnerability Management Processes
3 Evaluating Program Operations
Part 3 Program Setup
4 Defining Program Scope and Bounties
5 Understanding Safe Harbor and Service Level Agreements
6 Program Configuration
Part 4 Vulnerability Reports and Disclosure
7 Triage and Bug Management
8 Vulnerability Disclosure Information
Part 5 Internal and External Communication
9 Development and Application Security Collaboration
10 Hacker and Program Interaction Essentials
Part 6 Assessments and Expansions
11 Internal Assessments
12 Expanding Scope
13 Public Release
Index

Скачать Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program





ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!





[related-news]
[/related-news]
Комментарии 0
Комментариев пока нет. Стань первым!