Research Methods for Cyber Security
Syngress Media,U.S. (Verlag)
978-0-12-805349-2 (ISBN)
Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.
Thomas Edgar is a Senior Cyber Security Research Scientist at the Pacific Northwest National Laboratory. He has completed research in the areas of secure communication protocols, cryptographic trust management, critical infrastructure protection, and developing a scientific approach to cyber security. Edgar’s research interests include the scientific underpinnings of cyber security and applying scientific based cyber security solutions to enterprise and critical infrastructure environments. His expertise lies in scientific process, critical infrastructure security, protocol development, cyber forensics, network security, and testbed and experiment construction. Edgar has a BS and MS in Computer Science from the University of Tulsa with a specialization in information assurance. David Manz is currently a Senior Cyber Security Scientist in the National Security Directorate at the Pacific Northwest National Laboratory. He holds a B.S. in Computer and Information Science from the Robert D. Clark Honors College at the University of Oregon and a Ph.D. in Computer Science from the University of Idaho. David's work at PNNL includes enterprise resilience and cyber security, secure control system communication, and critical infrastructure security. Enabling his research is an application of relevant research methods for cyber security (Cyber Security Science). Prior to his work at PNNL, David spent five years as a researcher on Group Key Management Protocols for the Center for Secure and Dependable Systems at the University of Idaho (U of I). David also has experience teaching undergraduate and graduate computer science courses at U of I, and as an adjunct faculty at Washington State University. David has co-authored numerous papers and presentations on cyber security, control system security, and cryptographic key management.
Part I. Introduction
1. Introduction to Science
2. Science and Cyber Security
3. Starting Your Research
Part II. Observational Research Methods
4. Exploratory Study
5. Descriptive Study
6. Machine Learning
Part III: Mathematical Research Methods
7. Theoretical Research
8. Using Simulation for Research
Part IV. Experimental Research Methods
9. Hypothetico-deductive Research
10. Quasi-experimental Research
Part V. Applied Research Methods
11. Applied Experimentation
12. Applied Observational Study
Part VI: Additional Materials
13. Instrumentation
14. Addressing the Adversary
15. Scientific Ethics
| Erscheinungsdatum | 05.05.2017 |
|---|---|
| Verlagsort | Rockland, MA |
| Sprache | englisch |
| Maße | 191 x 235 mm |
| Gewicht | 840 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| ISBN-10 | 0-12-805349-6 / 0128053496 |
| ISBN-13 | 978-0-12-805349-2 / 9780128053492 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich