EasterBlack-owned or founded brands at TargetGroceryClothing, Shoes & AccessoriesBabyHomeFurnitureKitchen & DiningOutdoor Living & GardenToysElectronicsVideo GamesMovies, Music & BooksSports & OutdoorsBeautyPersonal CareHealthPetsHousehold EssentialsArts, Crafts & SewingSchool & Office SuppliesParty SuppliesLuggageGift IdeasGift CardsClearanceTarget New ArrivalsTarget Finds#TargetStyleTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores

Corporate Cybersecurity - by John Jackson (Hardcover)

Corporate Cybersecurity - by  John Jackson (Hardcover) - 1 of 1
$106.99 sale price when purchased online
$118.95 list price
Target Online store #3991

About this item

Highlights

  • CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
  • About the Author: John Jackson is a Cyber Security Professional, Hacker, and the founder of the Hacking Group: Sakura Samurai.
  • 224 Pages
  • Computers + Internet, Security

Description



About the Book



"Understanding the evolution of bug bounty programs first requires familiarity with the hacking landscape, or as many in the information security field know it, penetration testing. Security researchers haven't always been respected nor given the opportunity to shine. Throughout history, hacking has been a word that scares the public and creates waves of fear inside of a company when rumors of a 'hack' spread. The first bounty paid for breaking into something (in recorded history) was in 1851. Charles Alfred Hobbs was paid roughly the equivalent of $20,000 US Dollars to pick a physical lock. (https://www.itspmagazine.com/itsp-chronicles/history-and-interesting-facts-about-bug-bounties-an-appsec-usa-2017-panel-recap)."



Book Synopsis



CORPORATE CYBERSECURITY

An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs

A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs.

This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book:

  • Contains a much-needed guide aimed at cyber and application security engineers
  • Presents a unique defensive guide for understanding and resolving security vulnerabilities
  • Encourages research, configuring, and managing programs from the corporate perspective
  • Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA

Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.



From the Back Cover



An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs

A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs.

This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book:

  • Contains a much-needed guide aimed at cyber and application security engineers
  • Presents a unique defensive guide for understanding and resolving security vulnerabilities
  • Encourages research, configuring, and managing programs from the corporate perspective
  • Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA

Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.



About the Author



John Jackson is a Cyber Security Professional, Hacker, and the founder of the Hacking Group: Sakura Samurai. He is skilled in the art of configuring, managing, and utilizing Application Security Tools and programs, and an effective leader in the Cyber Security space. His unique perspective as both an Engineer and a Security Researcher provides hands-on experience towards configuring programs in a way that both organizations and researchers can benefit.

Dimensions (Overall): 9.61 Inches (H) x 6.69 Inches (W) x .56 Inches (D)
Weight: 1.24 Pounds
Suggested Age: 22 Years and Up
Sub-Genre: Security
Genre: Computers + Internet
Number of Pages: 224
Publisher: Wiley-IEEE Press
Theme: Cryptography
Format: Hardcover
Author: John Jackson
Language: English
Street Date: October 25, 2021
TCIN: 1002714972
UPC: 9781119782520
Item Number (DPCI): 247-29-8823
Origin: Made in the USA or Imported
If the item details above aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.56 inches length x 6.69 inches width x 9.61 inches height
Estimated ship weight: 1.24 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
See the return policy for complete information.

Trending Computers & Technology Books

Cybersecurity for Dummies - 3rd Edition by  Joseph Steinberg (Paperback)

$24.99
MSRP $29.99
Buy 1, get 1 50% off select books, games & more

The Coming Wave - by Mustafa Suleyman

$16.99 - $18.83
MSRP $20.00 - $32.50
Buy 1, get 1 50% off select books, games & more

Nexus - by  Yuval Noah Harari (Hardcover)

$21.71
MSRP $35.00
Buy 1, get 1 50% off select books, games & more

The Julia Rothman Collection - (Paperback)

$31.49
MSRP $57.00
Buy 1, get 1 50% off select books, games & more
4.6 out of 5 stars with 10 ratings

Discover more options

Design of Power Management Integrated Circuits - (IEEE Press) by  Bernhard Wicht (Hardcover)

$108.56
MSRP $135.00
Buy 1, get 1 50% off select books, games & more

5G Radio Access Network Architecture - (IEEE Press) by  Sasha Sirotkin (Hardcover)

$115.99
MSRP $143.95
Buy 1, get 1 50% off select books, games & more

Electro Static Discharge - 3rd Edition by  Michel Mardiguian (Hardcover)

$138.99
Buy 1, get 1 50% off select books, games & more

Intelligent Connectivity - (IEEE Press) by  Abdulrahman Yarali (Hardcover)

$114.78
MSRP $129.95
Buy 1, get 1 50% off select books, games & more

Related Categories

Get top deals, latest trends, and more.

Privacy policy

Footer

About Us

About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

Help

Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member Services

Stores

Find a StoreClinicPharmacyTarget OpticalMore In-Store Services

Services

Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy