000 | 02567nam a2200409 i 4500 | ||
---|---|---|---|
001 | 00012247 | ||
003 | WSP | ||
007 | cr cnu|||unuuu | ||
008 | 210501s2021 si ob 001 0 eng d | ||
040 |
_a WSPC _b eng _e rda _c WSPC |
||
010 | _z 2021009781 | ||
020 |
_a9789811235863 _q(ebook) |
||
020 |
_z9789811235856 _q(hardback) |
||
050 | 0 | 4 |
_aTK5105.59 _b.M496 2021 |
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
072 | 7 |
_aCOM _x083000 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aMetcalf, Leigh, _eauthor. _920727 |
|
245 | 1 | 0 |
_aUsing science in cybersecurity / _cby Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA. |
264 | 1 |
_aSingapore : _bWorld Scientific, _c2021. |
|
300 | _a1 online resource (x, 291 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bn _2rdamedia |
||
338 |
_aonline resource _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntroduction -- Data in cybersecurity -- In search of truth -- Desirable study properties -- Exploratory data analysis -- Sampling in cybersecurity -- Designing structured observations -- Data analysis for cybersecurity : goals and pitfalls -- DNS study -- Network traffic study -- Malware study -- Human factors. | |
520 | _a"Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--Publisher's website. | ||
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat Reader. | ||
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer security. _93970 |
|
655 | 0 |
_aElectronic books. _93294 |
|
700 | 1 |
_aSpring, Jonathan M., _eauthor. _920728 |
|
856 | 4 | 0 |
_uhttps://www.worldscientific.com/worldscibooks/10.1142/12247#t=toc _zAccess to full text is restricted to subscribers. |
942 | _cEBK | ||
999 |
_c72569 _d72569 |