LEADER 02893oam 2200457 450 001 9910583324603321 005 20190911100031.0 010 $a0-12-812930-1 035 $a(OCoLC)1013516283 035 $a(MiFhGG)GVRL09FY 035 $a(EXLCZ)993710000001178425 100 $a20170110h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aResearch methods for cyber security /$fThomas W. Edgar, David O. Manz 205 $a1st edition 210 1$aCambridge, Massachusetts :$cSyngress, an imprint of Elsevier,$d[2017] 210 4$d?2017 215 $a1 online resource (xxiii, 404 pages) $cillustrations (some color) 225 0 $aGale eBooks 300 $aIncludes index. 311 $a0-12-805349-6 320 $aIncludes bibliographical references and index. 327 $apt. 1. Introduction -- pt. 2. Observational research methods -- pt. 3. Mathematical research methods -- pt. 4. Experimental research methods -- pt. 5. Applied research methods -- pt. 6. Additional materials. 330 $aResearch Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage 606 $aComputer security 606 $aCyberspace$xSecurity measures 615 0$aComputer security. 615 0$aCyberspace$xSecurity measures. 676 $a005.8071 700 $aEdgar$b Thomas W.$018824 702 $aManz$b David O. 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910583324603321 996 $aResearch methods for cyber security$92089372 997 $aUNINA