9780128053492-0128053496-Research Methods for Cyber Security

Research Methods for Cyber Security

ISBN-13: 9780128053492
ISBN-10: 0128053496
Edition: 1
Author: Thomas W. Edgar, David O. Manz
Publication date: 2017
Publisher: Syngress
Format: Paperback 428 pages
FREE US shipping on ALL non-marketplace orders
Rent
35 days
from $44.24 USD
FREE shipping on RENTAL RETURNS
Marketplace
from $55.51 USD
Buy

From $26.99

Rent

From $44.24

Book details

ISBN-13: 9780128053492
ISBN-10: 0128053496
Edition: 1
Author: Thomas W. Edgar, David O. Manz
Publication date: 2017
Publisher: Syngress
Format: Paperback 428 pages

Summary

Research Methods for Cyber Security (ISBN-13: 9780128053492 and ISBN-10: 0128053496), written by authors Thomas W. Edgar, David O. Manz, was published by Syngress in 2017. With an overall rating of 3.9 stars, it's a notable title among other Security & Encryption books. You can easily purchase or rent Research Methods for Cyber Security (Paperback) from BooksRun, along with many other new and used Security & Encryption books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $19.41.

Description

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research.

Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book