Library Catalogue

Research methods for cyber security / (Record no. 31782)

MARC details
000 -LEADER
fixed length control field 02098cam a22003017i 4500
001 - CONTROL NUMBER
control field 19435755
003 - CONTROL NUMBER IDENTIFIER
control field KENaKMTC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231018094806.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170110s2017 mau b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2017930693
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128053492
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9780128129302
Qualifying information (eBook)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency DLC
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA300.E35 2017
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Edgar, Thomas W.,
Relator term author.
245 10 - TITLE STATEMENT
Title Research methods for cyber security /
Statement of responsibility, etc Thomas W. Edgar, David O. Manz.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Cambridge
Name of publisher, distributor, etc Syngress
Date of publication, distribution, etc c2017
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 404 pages ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note Minimal Level Cataloging Plus.
Institution to which field applies DLC
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well -- page 4 of cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element 1. Computer security
General subdivision Study and teaching.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name I. Manz, David O.,
Relator term author.
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="Uniform Resource Identifier">Uniform Resource Identifier</a>
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 4
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Intials PN
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     KMTC:ELDORET CAMPUS KMTC:ELDORET CAMPUS General Stacks 04/10/2023 Donated by BAI 07351   QA300.E35 2017 ELD/07351 18/10/2023 1 18/10/2023 Books

© 2024, Kenya Medical Training College | All Rights Reserved