Cargando…

Research methods for cyber security /

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Edgar, Thomas W. (Autor), Manz, David O. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn986525874
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170510s2017 maua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d YDX  |d NLE  |d OPELS  |d STF  |d TOH  |d OCLCF  |d UAB  |d OTZ  |d MERER  |d OCLCQ  |d OCLCA  |d D6H  |d U3W  |d OCLCQ  |d CEF  |d KSU  |d NLMVD  |d OCLCQ  |d BRX  |d S2H  |d OCLCO  |d RID  |d LVT  |d EBLCP  |d N$T  |d IDEBK  |d COO  |d MERUC  |d VT2  |d UOK  |d WYU  |d OL$  |d CNCEN  |d ERF  |d UKBTH  |d UHL  |d TAC  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ 
019 |a 985280295  |a 985346139  |a 985364196  |a 985401681  |a 985484003  |a 985637434  |a 985763387  |a 986024437  |a 986475640  |a 986723497  |a 986807727  |a 988056631  |a 1112558651  |a 1113101900  |a 1113703047  |a 1224587222  |a 1302272922  |a 1302703802  |a 1355685243 
020 |a 9780128129302  |q (electronic bk.) 
020 |a 0128129301  |q (electronic bk.) 
020 |z 9780128053492 
020 |z 0128053496 
024 8 |a C20150042216 
024 8 |a 9780128129302 
029 1 |a AU@  |b 000061155366 
029 1 |a CHBIS  |b 011069428 
029 1 |a CHNEW  |b 001014253 
029 1 |a CHVBK  |b 49979138X 
029 1 |a GBVCP  |b 1004857098 
029 1 |a NLGGC  |b 411252143 
029 1 |a AU@  |b 000061011202 
029 1 |a CHNEW  |b 000973718 
029 1 |a GBVCP  |b 889890897 
035 |a (OCoLC)986525874  |z (OCoLC)985280295  |z (OCoLC)985346139  |z (OCoLC)985364196  |z (OCoLC)985401681  |z (OCoLC)985484003  |z (OCoLC)985637434  |z (OCoLC)985763387  |z (OCoLC)986024437  |z (OCoLC)986475640  |z (OCoLC)986723497  |z (OCoLC)986807727  |z (OCoLC)988056631  |z (OCoLC)1112558651  |z (OCoLC)1113101900  |z (OCoLC)1113703047  |z (OCoLC)1224587222  |z (OCoLC)1302272922  |z (OCoLC)1302703802  |z (OCoLC)1355685243 
037 |a CL0500000857  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Edgar, Thomas W.,  |e author. 
245 1 0 |a Research methods for cyber security /  |c Thomas W. Edgar, David O. Manz. 
264 1 |a Cambridge, MA :  |b Syngress,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from title page (viewed May 8, 2017). 
504 |a Includes bibliographical references and index. 
505 0 |a I. Introduction -- 1. Introduction to Science -- 2. Science and Cyber Security -- 3. Starting Your Research -- II. Observational Research Methods. 4. Exploratory Study -- 5. Descriptive Study --6. Machine Learning -- III. Mathematical Research Methods. 7. Theoretical Research -- 8. Using Simulation for Research -- IV. Experimental Research Methods. 9. Hypothetico-deductive Research -- 10. Quasi-experimental Research -- V. Applied Research Methods. 11. Applied Experimentation -- 12. Applied Observational Study -- VI. Additional Materials. 13. Instrumentation -- 14. Addressing the Adversary -- 15. Scientific Ethics -- VI. Additional Materials. 13. Instrumentation -- 14. Addressing the Adversary -- 15. Scientific Ethics. 
520 |a Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage. 
542 |f Copyright &#169: Elsevier Science & Technology  |g 2017 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Study and teaching. 
650 6 |a Sécurité informatique  |x Étude et enseignement. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Study and teaching.  |2 fast  |0 (OCoLC)fst00872496 
700 1 |a Manz, David O.,  |e author. 
776 0 8 |i Print version:  |a Edgar, Thomas W.  |t Research methods for cyber security.  |d ©2017  |z 0128053496  |z 9780128053492  |w (OCoLC)960894837 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128129302/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 14265622 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4848075 
938 |a EBSCOhost  |b EBSC  |n 1414738 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis38057438 
994 |a 92  |b IZTAP