Normal view MARC view ISBD view

Using science in cybersecurity / by Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA.

By: Metcalf, Leigh [author.].
Contributor(s): Spring, Jonathan M [author.].
Material type: materialTypeLabelBookPublisher: Singapore : World Scientific, 2021Description: 1 online resource (x, 291 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9789811235863.Subject(s): Computer networks -- Security measures | Computer securityGenre/Form: Electronic books.DDC classification: 005.8 Online resources: Access to full text is restricted to subscribers.
Contents:
Introduction -- Data in cybersecurity -- In search of truth -- Desirable study properties -- Exploratory data analysis -- Sampling in cybersecurity -- Designing structured observations -- Data analysis for cybersecurity : goals and pitfalls -- DNS study -- Network traffic study -- Malware study -- Human factors.
Summary: "Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--Publisher's website.
    average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

Introduction -- Data in cybersecurity -- In search of truth -- Desirable study properties -- Exploratory data analysis -- Sampling in cybersecurity -- Designing structured observations -- Data analysis for cybersecurity : goals and pitfalls -- DNS study -- Network traffic study -- Malware study -- Human factors.

"Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--Publisher's website.

Mode of access: World Wide Web.

System requirements: Adobe Acrobat Reader.

There are no comments for this item.

Log in to your account to post a comment.