|
|
|
|
LEADER |
00000cgm a2200000Ii 4500 |
001 |
OR_ocn919086043 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
150824s2015 xx 066 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCA
|d ERF
|d OCLCO
|d OCLCQ
|
029 |
1 |
|
|a AU@
|b 000067118344
|
035 |
|
|
|a (OCoLC)919086043
|
037 |
|
|
|a CL0500000632
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.875.I57
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 23/eng/20220602
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dykstra, Josiah,
|e speaker.
|
245 |
1 |
0 |
|a Getting started with cybersecurity science /
|c Josiah Dykstra.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly,
|c [2015]
|
300 |
|
|
|a 1 online resource (1 streaming video file (1 hr., 5 min., 54 sec.)) :
|b digital, sound, color
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Date from resource description page.
|
500 |
|
|
|a Title from title screen (viewed August 17, 2015).
|
511 |
0 |
|
|a Presenter, Josiah Dykstra.
|
520 |
|
|
|a "Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Cybersecurity professionals are attracted to these challenges and motivated to use their expertise to bring sanity and solutions to real world problems. Applying science to this process is often relegated solely to academics in ivory towers. This webcast will provide an introduction and practical information about how you can use science to understand and improve the tools you build and use everyday. Whether you're a student, software developer, forensic investigator, network administrator, or have any other role in providing cybersecurity, you'll learn about the relevant scientific principles and flexible methodologies for effective cybersecurity. This webcast will focus on real-world applications of science to your role in providing cybersecurity. You'll learn about why science is worth the added effort, how to develop your own cybersecurity experiments, and insights from specific examples of experimentation in cybersecurity."--Resource description page.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781491936528/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|