“Using Science in Cybersecurity” is centered on analyzing cybersecurity problems and offering solutions via the scientific method. Thus, it proves that, although numerous specialists recognize the importance of applying scientific foundations in cybersecurity, they often lack clear directions on how to do it. This book tries to meet that need by offering tools and instances to guide the reader concerning applying these principles to his or her job. It is intended to help better understand such a complex area as cybersecurity and explain how it is possible to build the security system’s proper foundations, even in conditions of uncertainty.
Therefore, the targeted readership of the book includes the following categories of persons: advanced undergraduate and graduate students, researchers, and cybersecurity and information security professionals. This way, it teaches the audience that scientific methods can be applied practically and may help one deal with daily cybersecurity issues. The reader of this book, “Using Science in Cybersecurity,” will gain helpful information and effective recommendations to enhance the work in cybersecurity, which is why the book is highly recommended to people interested in the corporative development of cybersecurity approaches and strategies.
Using Science in Cybersecurity Table of Contents:
- Introduction
- Data in Cybersecurity
- In Search of Truth
- Desirable Study Properties
- Exploratory Data Analysis
- Sampling in Cybersecurity
- Designing Structured Observations
- Data Analysis for Cybersecurity: Goals and Pitfalls
- DNS Study
- Network Traffic Study
- Malware Study
- Human Factors
Who is this course for?
- Advanced undergraduate students
- Graduate students
- Researchers in cybersecurity
- Practitioners in cybersecurity
- Information security professionals
- Individuals interested in the science of cybersecurity
Click on the links below to Download Using Science in Cybersecurity!
در حال پاسخ به :