Research methods for cyber security

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction t...

Full description

Bibliographic Details
Main Authors: Edgar, Thomas W., Manz, David O. (Author)
Format: eBook
Language:English
Published: Cambridge, MA Syngress 2017
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03209nmm a2200349 u 4500
001 EB001943005
003 EBX01000000000000001105907
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780128129302 
050 4 |a QA76.9.A25 
100 1 |a Edgar, Thomas W. 
245 0 0 |a Research methods for cyber security  |c Thomas W. Edgar, David O. Manz 
260 |a Cambridge, MA  |b Syngress  |c 2017 
300 |a 1 volume  |b illustrations 
505 0 |a I. Introduction -- 1. Introduction to Science -- 2. Science and Cyber Security -- 3. Starting Your Research -- II. Observational Research Methods. 4. Exploratory Study -- 5. Descriptive Study --6. Machine Learning -- III. Mathematical Research Methods. 7. Theoretical Research -- 8. Using Simulation for Research -- IV. Experimental Research Methods. 9. Hypothetico-deductive Research -- 10. Quasi-experimental Research -- V. Applied Research Methods. 11. Applied Experimentation -- 12. Applied Observational Study -- VI. Additional Materials. 13. Instrumentation -- 14. Addressing the Adversary -- 15. Scientific Ethics -- VI. Additional Materials. 13. Instrumentation -- 14. Addressing the Adversary -- 15. Scientific Ethics 
505 0 |a Includes bibliographical references and index 
653 |a Computer security / Study and teaching 
653 |a Computer security / Study and teaching / fast 
653 |a Sécurité informatique / Étude et enseignement 
653 |a COMPUTERS / Security / General / bisacsh 
700 1 |a Manz, David O.  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9780128053492 
776 |z 0128129301 
776 |z 0128053496 
776 |z 9780128129302 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128129302/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage