|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1322446729 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
220602s2022 cau105 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCO
|
024 |
8 |
|
|a 0636920670926
|
029 |
1 |
|
|a AU@
|b 000072055565
|
035 |
|
|
|a (OCoLC)1322446729
|
037 |
|
|
|a 0636920670926
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20220602
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Getting started with cybersecurity science /
|c Josiah Dykstra.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Sebastopol, California] :
|b O'Reilly Media, Inc.,
|c [2022]
|
300 |
|
|
|a 1 online resource (1 video file (1 hr., 45 min.)) :
|b sound, color.
|
306 |
|
|
|a 014500
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Josiah Dykstra.
|
520 |
|
|
|a Join Josiah Dykstra for an introduction to the application of scientific methodology to the process of creating cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Many cybersecurity professionals are attracted to the challenges of building these tools and systems, and are motivated to use their expertise to bring sanity and solutions to real-world problems. The addition of scientific methodology aids in dealing with uncertainty, unknowns, choices, and crises. It can improve existing products and lead to groundbreaking innovation and applications. In this course, you’ll focus on practical, real-world applications of science to the work you do. You’ll learn about scientific principles and flexible methodologies for effective security as you design, execute, and evaluate your own experiments. You’ll discover why the application of science is worth the added effort and you’ll glean insights from specific examples of experimentation in cybersecurity.
|
588 |
0 |
|
|a Online resource; title from title details screen (O’Reilly, viewed June 2, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer security
|x Statistical methods.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Sécurité informatique
|x Méthodes statistiques.
|
650 |
|
7 |
|a Computer security
|2 fast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Dykstra, Josiah,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/0636920670926/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|