Cargando…

Getting started with cybersecurity science /

"Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Cybersecurity professionals are attracted to these challenges and motivated to use their expertise to bring sanity and solutions to real world problems. Applying science to this process is often relegated solely...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Dykstra, Josiah (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_ocn919086043
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 150824s2015 xx 066 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCA  |d ERF  |d OCLCO  |d OCLCQ 
029 1 |a AU@  |b 000067118344 
035 |a (OCoLC)919086043 
037 |a CL0500000632  |b Safari Books Online 
050 4 |a TK5105.875.I57 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20220602 
049 |a UAMI 
100 1 |a Dykstra, Josiah,  |e speaker. 
245 1 0 |a Getting started with cybersecurity science /  |c Josiah Dykstra. 
264 1 |a [Place of publication not identified] :  |b O'Reilly,  |c [2015] 
300 |a 1 online resource (1 streaming video file (1 hr., 5 min., 54 sec.)) :  |b digital, sound, color 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Date from resource description page. 
500 |a Title from title screen (viewed August 17, 2015). 
511 0 |a Presenter, Josiah Dykstra. 
520 |a "Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Cybersecurity professionals are attracted to these challenges and motivated to use their expertise to bring sanity and solutions to real world problems. Applying science to this process is often relegated solely to academics in ivory towers. This webcast will provide an introduction and practical information about how you can use science to understand and improve the tools you build and use everyday. Whether you're a student, software developer, forensic investigator, network administrator, or have any other role in providing cybersecurity, you'll learn about the relevant scientific principles and flexible methodologies for effective cybersecurity. This webcast will focus on real-world applications of science to your role in providing cybersecurity. You'll learn about why science is worth the added effort, how to develop your own cybersecurity experiments, and insights from specific examples of experimentation in cybersecurity."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Internet  |x Security measures.  |2 fast  |0 (OCoLC)fst01751426 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781491936528/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP