Library Catalogue

Amazon cover image
Image from Amazon.com
Image from Google Jackets

Research methods for cyber security / Thomas W. Edgar, David O. Manz.

By: Contributor(s): Material type: TextTextPublication details: Cambridge Syngress c2017Description: xxiii, 404 pages ; 24 cmISBN:
  • 9780128053492
Subject(s): LOC classification:
  • QA300.E35 2017
Online resources: Summary: Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well -- page 4 of cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books KMTC:ELDORET CAMPUS General Stacks QA300.E35 2017 (Browse shelf(Opens below)) 1 Available ELD/07351

Minimal Level Cataloging Plus. DLC

Includes bibliographical references and index.

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well -- page 4 of cover.

There are no comments on this title.

to post a comment.

© 2024, Kenya Medical Training College | All Rights Reserved