Research methods for cyber security / Thomas W. Edgar, David O. Manz.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9780128053492
- 0128053496
- QA76.9.A25 E3865 2017
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 E3865 2017 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30020000034400 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 E325 2012 Computer security fundamentals / | QA76.9.A25 E325 2012 Computer security fundamentals / | QA76.9.A25 E325 2012 Computer security fundamentals / | QA76.9.A25 E3865 2017 Research methods for cyber security / | QA76.9.A25 F37 2011 الحماية الالكترونية : حماية المنظومات الالكترونية و وسائط الاتصال / | QA76.9.A25 F37 2011 الحماية الالكترونية : حماية المنظومات الالكترونية و وسائط الاتصال / | QA76.9.A25 F525 2003 Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology / |
Includes bibliographical references and index.
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well -- page 4 of cover.