MARC details
000 -LEADER |
fixed length control field |
02098cam a22003017i 4500 |
001 - CONTROL NUMBER |
control field |
19435755 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
KENaKMTC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231018094806.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
170110s2017 mau b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2017930693 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780128053492 |
Qualifying information |
(paperback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9780128129302 |
Qualifying information |
(eBook) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
Modifying agency |
DLC |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA300.E35 2017 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Edgar, Thomas W., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Research methods for cyber security / |
Statement of responsibility, etc |
Thomas W. Edgar, David O. Manz. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Cambridge |
Name of publisher, distributor, etc |
Syngress |
Date of publication, distribution, etc |
c2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiii, 404 pages ; |
Dimensions |
24 cm |
500 ## - GENERAL NOTE |
General note |
Minimal Level Cataloging Plus. |
Institution to which field applies |
DLC |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well -- page 4 of cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
1. Computer security |
General subdivision |
Study and teaching. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
I. Manz, David O., |
Relator term |
author. |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="Uniform Resource Identifier">Uniform Resource Identifier</a> |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
4 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |
Intials |
PN |