Using science in cybersecurity

Bibliographische Detailangaben

Titel
Using science in cybersecurity
verantwortlich
Metcalf, Leigh (VerfasserIn); Spring, Jonathan M. (VerfasserIn)
Ausgabe
First.
veröffentlicht
Hackensack, NJ: World Scientific, [2021]
Erscheinungsjahr
2021
Medientyp
Buch
Datenquelle
British Library Catalogue
Tags
Tag hinzufügen

Zugang

Weitere Informationen sehen Sie, wenn Sie angemeldet sind. Noch keinen Account? Jetzt registrieren.

LEADER 02209aam a2200421 i 4500
001 181-020295989
003 Uk
005 20211216085333.0
008 210302s2021 njua b 001 0 eng
007 tu
010 |a  2021009781 
015 |a GBC1L0608  |2 bnb 
016 7 |a 020295989  |2 Uk 
020 |a 9789811235856  |q (hardcover) 
020 |z 9789811235863  |q (ebook for institutions) 
020 |z 9789811235870  |q (ebook for individuals) 
040 |a DLC  |b eng  |c DLC  |d Uk  |e rda 
042 |a ukblcatcopy 
050 0 0 |a TK5105.59  |b .M496 2021 
082 0 0 |a 005.8  |2 23 
100 1 |a Metcalf, Leigh  |e author. 
245 1 0 |a Using science in cybersecurity  |c Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA 
250 |a First. 
264 1 |a Hackensack, NJ  |b World Scientific  |c [2021] 
300 |a x, 291 pages :  |b illustrations ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
530 |a Also published electronically. 
504 |a Includes bibliographical references and index. 
520 |a "Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--  |c Provided by publisher. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
700 1 |a Spring, Jonathan M.  |e author. 
852 1 1 |a British Library  |b STI  |k (B)  |h 005.8 
852 1 1 |a British Library  |b STI  |k (B)  |h 005.8 
980 |a 020295989  |b 181  |c sid-181-col-blfidbbi 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fkatalog.fid-bbi.de%3Agenerator&rft.title=Using+science+in+cybersecurity&rft.date=%5B2021%5D&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Using+science+in+cybersecurity&rft.au=Metcalf%2C+Leigh&rft.pub=World+Scientific&rft.edition=First.&rft.isbn=9811235856
SOLR
_version_ 1778756024299159552
access_facet Local Holdings
author Metcalf, Leigh, Spring, Jonathan M.
author_facet Metcalf, Leigh, Spring, Jonathan M.
author_role aut, aut
author_sort Metcalf, Leigh
author_variant l m lm, j m s jm jms
building Library A
callnumber-first T - Technology
callnumber-label TK5105
callnumber-raw TK5105.59 .M496 2021
callnumber-search TK5105.59 .M496 2021
callnumber-sort TK 45105.59 M496 42021
callnumber-subject TK - Electrical and Nuclear Engineering
collection sid-181-col-blfidbbi
contents "Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--
dewey-full 005.8
dewey-hundreds 000 - Computer science, information & general works
dewey-ones 005 - Computer programming, programs & data
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, knowledge & systems
edition First.
facet_avail Local
finc_class_facet Informatik, Technik
fincclass_txtF_mv science-computerscience
format Book
format_access_txtF_mv Book, E-Book
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-print-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy Book
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv Book
geogr_code not assigned
geogr_code_person not assigned
id 181-020295989
illustrated Illustrated
imprint Hackensack, NJ, World Scientific, [2021]
imprint_str_mv Hackensack, NJ World Scientific [2021]
institution FID-BBI-DE-23
is_hierarchy_id
is_hierarchy_title
isbn 9789811235856
isbn_isn_mv 9789811235863, 9789811235870
isil_str_mv FID-BBI-DE-23
language English
last_indexed 2023-10-03T17:25:35.526Z
lccn 2021009781
match_str metcalf2021usingscienceincybersecurity
mega_collection British Library Catalogue
physical x, 291 pages; illustrations; 24 cm
publishDate [2021]
publishDateSort 2021
publishPlace Hackensack, NJ
publisher World Scientific
record_format marcfinc
record_id 020295989
recordtype marcfinc
rvk_facet No subject assigned
source_id 181
spelling Metcalf, Leigh author., Using science in cybersecurity Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA, First., Hackensack, NJ World Scientific [2021], x, 291 pages : illustrations ; 24 cm, text txt rdacontent, still image rdacontent, unmediated n rdamedia, volume nc rdacarrier, Also published electronically., Includes bibliographical references and index., "Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"-- Provided by publisher., Computer networks Security measures., Computer security., Spring, Jonathan M. author., British Library STI (B) 005.8
spellingShingle Metcalf, Leigh, Spring, Jonathan M., Using science in cybersecurity, "Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--, Computer networks Security measures., Computer security.
title Using science in cybersecurity
title_auth Using science in cybersecurity
title_full Using science in cybersecurity Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA
title_fullStr Using science in cybersecurity Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA
title_full_unstemmed Using science in cybersecurity Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA
title_short Using science in cybersecurity
title_sort using science in cybersecurity
topic Computer networks Security measures., Computer security.
topic_facet Computer networks, Computer security., Security measures.