Research Methods for Cyber Security

Author:   Thomas W. Edgar (Senior Cyber Security Scientist, Pacific Northwest National Laboratory) ,  David O. Manz (Senior Cyber Security Scientist, Pacific Northwest National Laboratory)
Publisher:   Syngress Media,U.S.
ISBN:  

9780128053492


Pages:   428
Publication Date:   21 April 2017
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $237.47 Quantity:  
Add to Cart

Share |

Research Methods for Cyber Security


Add your own review!

Overview

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

Full Product Details

Author:   Thomas W. Edgar (Senior Cyber Security Scientist, Pacific Northwest National Laboratory) ,  David O. Manz (Senior Cyber Security Scientist, Pacific Northwest National Laboratory)
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Weight:   0.840kg
ISBN:  

9780128053492


ISBN 10:   0128053496
Pages:   428
Publication Date:   21 April 2017
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Part I. Introduction 1. Introduction to Science 2. Science and Cyber Security 3. Starting Your Research Part II. Observational Research Methods 4. Exploratory Study 5. Descriptive Study 6. Machine Learning Part III: Mathematical Research Methods 7. Theoretical Research 8. Using Simulation for Research Part IV. Experimental Research Methods 9. Hypothetico-deductive Research 10. Quasi-experimental Research Part V. Applied Research Methods 11. Applied Experimentation 12. Applied Observational Study Part VI: Additional Materials 13. Instrumentation 14. Addressing the Adversary 15. Scientific Ethics

Reviews

Author Information

Thomas Edgar is a Senior Cyber Security Research Scientist at the Pacific Northwest National Laboratory. He has completed research in the areas of secure communication protocols, cryptographic trust management, critical infrastructure protection, and developing a scientific approach to cyber security. Edgar’s research interests include the scientific underpinnings of cyber security and applying scientific based cyber security solutions to enterprise and critical infrastructure environments. His expertise lies in scientific process, critical infrastructure security, protocol development, cyber forensics, network security, and testbed and experiment construction. Edgar has a BS and MS in Computer Science from the University of Tulsa with a specialization in information assurance. David Manz is currently a Senior Cyber Security Scientist in the National Security Directorate at the Pacific Northwest National Laboratory. He holds a B.S. in Computer and Information Science from the Robert D. Clark Honors College at the University of Oregon and a Ph.D. in Computer Science from the University of Idaho. David's work at PNNL includes enterprise resilience and cyber security, secure control system communication, and critical infrastructure security. Enabling his research is an application of relevant research methods for cyber security (Cyber Security Science). Prior to his work at PNNL, David spent five years as a researcher on Group Key Management Protocols for the Center for Secure and Dependable Systems at the University of Idaho (U of I). David also has experience teaching undergraduate and graduate computer science courses at U of I, and as an adjunct faculty at Washington State University. David has co-authored numerous papers and presentations on cyber security, control system security, and cryptographic key management.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List