Research Methods for Cyber Security / Libristo.pl
Research Methods for Cyber Security

Kod: 14564654

Research Methods for Cyber Security

Autor Thomas Edgar, David Manz

Research Methods for Cyber Security teaches the needed scientific methods for generating impactful theories, adding critical rigor to the cyber security field. Research Methods for Cyber Security begins by showing how cyber secu ... więcej

496.41


Dostępna u dostawcy
Wysyłamy za 14 - 18 dni
Dodaj do schowka

Zobacz książki o podobnej tematyce

Bon podarunkowy: Radość gwarantowana

Wzór bonu podarunkowegoDowiedz się więcej

Więcej informacji o Research Methods for Cyber Security

Za ten zakup dostaniesz 291 punkty

Opis

Research Methods for Cyber Security teaches the needed scientific methods for generating impactful theories, adding critical rigor to the cyber security field. Research Methods for Cyber Security begins by showing how cyber security fits amongst other scientific fields. The book shows how to develop a research plan, beginning with starting research with a question, then offers a detailed description of the five approaches to cyber security research; formal theoretical, study, hypothetico-deductive, predictive modeling, and applied research. Each approach concludes with recommended outlines and suggested templates for submission to peer reviewed venues. The book concludes with addressing solutions to key cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Takes an applied approach and presents research methods from a cyber security science perspectiveCatalyzes the rigorous research necessary to propel the cyber security field forwardAdaptable workflows and methods for the type of research being conducted, presented in the context of real-world usage

Szczegóły książki

Kategoria Książki po angielsku Computing & information technology Computer security Privacy & data protection

496.41

Ulubione w innej kategorii


250 000
zadowolonych klientów

Od roku 2008 obsłużyliśmy wielu miłośników książek, ale dla nas każdy był tym wyjątkowym.


Paczkomat 12,99 ZŁ 31975 punktów

Copyright! ©2008-24 libristo.pl Wszelkie prawa zastrzeżonePrywatnieCookies


Konto: Logowanie
Wszystkie książki świata w jednym miejscu. I co więcej w super cenach.

Koszyk ( pusty )

Kup za 299 zł i
zyskaj darmową dostawę.

Twoja lokalizacja: