Cargando…

Getting started with cybersecurity science /

Join Josiah Dykstra for an introduction to the application of scientific methodology to the process of creating cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Many cybersecurity professionals are attracted to the challenges of buil...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Sebastopol, California] : O'Reilly Media, Inc., [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1322446729
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 220602s2022 cau105 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
024 8 |a 0636920670926 
029 1 |a AU@  |b 000072055565 
035 |a (OCoLC)1322446729 
037 |a 0636920670926  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20220602 
049 |a UAMI 
245 0 0 |a Getting started with cybersecurity science /  |c Josiah Dykstra. 
250 |a [First edition]. 
264 1 |a [Sebastopol, California] :  |b O'Reilly Media, Inc.,  |c [2022] 
300 |a 1 online resource (1 video file (1 hr., 45 min.)) :  |b sound, color. 
306 |a 014500 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Josiah Dykstra. 
520 |a Join Josiah Dykstra for an introduction to the application of scientific methodology to the process of creating cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Many cybersecurity professionals are attracted to the challenges of building these tools and systems, and are motivated to use their expertise to bring sanity and solutions to real-world problems. The addition of scientific methodology aids in dealing with uncertainty, unknowns, choices, and crises. It can improve existing products and lead to groundbreaking innovation and applications. In this course, you’ll focus on practical, real-world applications of science to the work you do. You’ll learn about scientific principles and flexible methodologies for effective security as you design, execute, and evaluate your own experiments. You’ll discover why the application of science is worth the added effort and you’ll glean insights from specific examples of experimentation in cybersecurity. 
588 0 |a Online resource; title from title details screen (O’Reilly, viewed June 2, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer security  |x Statistical methods. 
650 6 |a Sécurité informatique. 
650 6 |a Sécurité informatique  |x Méthodes statistiques. 
650 7 |a Computer security  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Dykstra, Josiah,  |e presenter. 
710 2 |a O'Reilly (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920670926/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP