Normal view MARC view ISBD view

Research methods for cyber security

By: Edgar, Thomas W
Title By: Manz, David O
Material type: BookPublisher: Cambridge, MA : Syngress, c2017.Description: xxiii, 404 p. : 24 cm. ill.ISBN: 9780128053492; 0128053496Subject(s): Computer security -- Study and teachingDDC classification: 005.8 ED RE Online resources: Location Map
Summary:
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cybersecurity field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cybersecurity research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer-reviewed venues. This book concludes with information on cross-cutting issues within cybersecurity research. Cybersecurity research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cybersecurity research but providing assistance in the execution of research as well -- page 4 of cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Notes Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8 ED RE (Browse shelf) Available Feb2019 T0061282
Total holds: 0

Includes bibliographical references and index.

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cybersecurity field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cybersecurity research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer-reviewed venues. This book concludes with information on cross-cutting issues within cybersecurity research. Cybersecurity research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cybersecurity research but providing assistance in the execution of research as well -- page 4 of cover.

Powered by Koha