Deploying the scientific method in cybersecurity today is a common\-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles.<\/p>
This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day\-to\-day problems.<\/p>
Using Science in Cybersecurity<\/em>\x26nbsp;is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity.<\/p>
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Leigh Metcalf has a PhD in Mathematics from Auburn University, with a focus in Algebraic Topology and Dynamical Systems. After ten years in industry, Dr Metcalf has been working for more than a decade at CERT, part of Carnegie Mellon University as a researcher that challenges assumptions made in cybersecurity research. She is a published author in the fields of DNS analysis, Game Theory, Blocklist Analysis and other topics. Dr Metcalf has written and released opensource software and is the primary author of the book Applied Mathematics and Cybersecurity. She is the co-founder and co-editor-in-chief of the new journal ACM Digital Threats: Research and Practice (DTRAP).
Jonathan Spring is a senior member of the technical staff with the CERT division of the Software Engineering Institute (SEI) at Carnegie Mellon University, where he has worked since 2009. Prior posts include adjunct professor at the University of Pittsburgh's School of Information Sciences and research fellow for the ICANN's Security and Stability Advisory Committee (SSAC); he has served as program chair of FloCon and the New Security Paradigms Workshop. Dr Spring holds a doctoral degree in computer science from University College London. At the SEI, he produces reliable evidence in support of crafting effective cybersecurity policies at the operational, organizational, and national levels. His practice includes the areas of vulnerability management, machine learning, and threat intelligence.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : World of Books (was SecondSale), Montgomery, IL, Etats-Unis
Etat : Good. Good condition ex-library book with usual library markings and stickers. N° de réf. du vendeur 00054562404
Quantité disponible : 1 disponible(s)
Vendeur : Academic US, Piscataway, NJ, Etats-Unis
Etat : New. Brand New. Excellent Customer Service. N° de réf. du vendeur 9789811235856
Quantité disponible : 3 disponible(s)
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
Etat : New. N° de réf. du vendeur ABLIING23Apr0412070083508
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 42651182-n
Quantité disponible : 2 disponible(s)
Vendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9789811235856
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 42651182
Quantité disponible : 2 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 42651182
Quantité disponible : 2 disponible(s)
Vendeur : Rarewaves.com USA, London, LONDO, Royaume-Uni
Hardback. Etat : New. Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles.This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity. N° de réf. du vendeur LU-9789811235856
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 42651182-n
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextrnrnDeploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there . N° de réf. du vendeur 440126250
Quantité disponible : Plus de 20 disponibles