Metcalf, Leigh,
Using science in cybersecurity / by Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA. - 1 online resource (x, 291 pages)
Includes bibliographical references and index.
Introduction -- Data in cybersecurity -- In search of truth -- Desirable study properties -- Exploratory data analysis -- Sampling in cybersecurity -- Designing structured observations -- Data analysis for cybersecurity : goals and pitfalls -- DNS study -- Network traffic study -- Malware study -- Human factors.
"Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--Publisher's website.
Mode of access: World Wide Web.
System requirements: Adobe Acrobat Reader.
9789811235863
Computer networks--Security measures.
Computer security.
Electronic books.
TK5105.59 / .M496 2021
005.8
Using science in cybersecurity / by Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA. - 1 online resource (x, 291 pages)
Includes bibliographical references and index.
Introduction -- Data in cybersecurity -- In search of truth -- Desirable study properties -- Exploratory data analysis -- Sampling in cybersecurity -- Designing structured observations -- Data analysis for cybersecurity : goals and pitfalls -- DNS study -- Network traffic study -- Malware study -- Human factors.
"Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--Publisher's website.
Mode of access: World Wide Web.
System requirements: Adobe Acrobat Reader.
9789811235863
Computer networks--Security measures.
Computer security.
Electronic books.
TK5105.59 / .M496 2021
005.8