Amazon cover image
Image from Amazon.com

Research methods for cyber security Thomas W. Edgar, David O. Manz

By: Contributor(s): Material type: TextTextPublication details: Cambridge, MA : Syngress, c2017.Description: xxiii, 404 p. : 24 cm. illISBN:
  • 9780128053492
  • 0128053496
Subject(s): DDC classification:
  • 005.8 ED RE
Online resources: Summary: Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cybersecurity field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cybersecurity research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer-reviewed venues. This book concludes with information on cross-cutting issues within cybersecurity research. Cybersecurity research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cybersecurity research but providing assistance in the execution of research as well -- page 4 of cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Notes Date due Barcode
REGULAR University of Wollongong in Dubai Main Collection 005.8 ED RE (Browse shelf(Opens below)) Available Feb2019 T0061282

Includes bibliographical references and index.

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cybersecurity field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cybersecurity research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer-reviewed venues. This book concludes with information on cross-cutting issues within cybersecurity research. Cybersecurity research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cybersecurity research but providing assistance in the execution of research as well -- page 4 of cover.

There are no comments on this title.

to post a comment.