|
|
|
|
LEADER |
02209aam a2200421 i 4500 |
001 |
181-020295989 |
003 |
Uk |
005 |
20211216085333.0 |
008 |
210302s2021 njua b 001 0 eng |
007 |
tu |
010 |
|
|
|a 2021009781
|
015 |
|
|
|a GBC1L0608
|2 bnb
|
016 |
7 |
|
|a 020295989
|2 Uk
|
020 |
|
|
|a 9789811235856
|q (hardcover)
|
020 |
|
|
|z 9789811235863
|q (ebook for institutions)
|
020 |
|
|
|z 9789811235870
|q (ebook for individuals)
|
040 |
|
|
|a DLC
|b eng
|c DLC
|d Uk
|e rda
|
042 |
|
|
|a ukblcatcopy
|
050 |
0 |
0 |
|a TK5105.59
|b .M496 2021
|
082 |
0 |
0 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Metcalf, Leigh
|e author.
|
245 |
1 |
0 |
|a Using science in cybersecurity
|c Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA
|
250 |
|
|
|a First.
|
264 |
|
1 |
|a Hackensack, NJ
|b World Scientific
|c [2021]
|
300 |
|
|
|a x, 291 pages :
|b illustrations ;
|c 24 cm
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
336 |
|
|
|a still image
|2 rdacontent
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|
530 |
|
|
|a Also published electronically.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--
|c Provided by publisher.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
700 |
1 |
|
|a Spring, Jonathan M.
|e author.
|
852 |
1 |
1 |
|a British Library
|b STI
|k (B)
|h 005.8
|
852 |
1 |
1 |
|a British Library
|b STI
|k (B)
|h 005.8
|
980 |
|
|
|a 020295989
|b 181
|c sid-181-col-blfidbbi
|
SOLR
_version_ |
1778756024299159552 |
access_facet |
Local Holdings |
author |
Metcalf, Leigh, Spring, Jonathan M. |
author_facet |
Metcalf, Leigh, Spring, Jonathan M. |
author_role |
aut, aut |
author_sort |
Metcalf, Leigh |
author_variant |
l m lm, j m s jm jms |
building |
Library A |
callnumber-first |
T - Technology |
callnumber-label |
TK5105 |
callnumber-raw |
TK5105.59 .M496 2021 |
callnumber-search |
TK5105.59 .M496 2021 |
callnumber-sort |
TK 45105.59 M496 42021 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
collection |
sid-181-col-blfidbbi |
contents |
"Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"-- |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
edition |
First. |
facet_avail |
Local |
finc_class_facet |
Informatik, Technik |
fincclass_txtF_mv |
science-computerscience |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
181-020295989 |
illustrated |
Illustrated |
imprint |
Hackensack, NJ, World Scientific, [2021] |
imprint_str_mv |
Hackensack, NJ World Scientific [2021] |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9789811235856 |
isbn_isn_mv |
9789811235863, 9789811235870 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:25:35.526Z |
lccn |
2021009781 |
match_str |
metcalf2021usingscienceincybersecurity |
mega_collection |
British Library Catalogue |
physical |
x, 291 pages; illustrations; 24 cm |
publishDate |
[2021] |
publishDateSort |
2021 |
publishPlace |
Hackensack, NJ |
publisher |
World Scientific |
record_format |
marcfinc |
record_id |
020295989 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
source_id |
181 |
spelling |
Metcalf, Leigh author., Using science in cybersecurity Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA, First., Hackensack, NJ World Scientific [2021], x, 291 pages : illustrations ; 24 cm, text txt rdacontent, still image rdacontent, unmediated n rdamedia, volume nc rdacarrier, Also published electronically., Includes bibliographical references and index., "Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"-- Provided by publisher., Computer networks Security measures., Computer security., Spring, Jonathan M. author., British Library STI (B) 005.8 |
spellingShingle |
Metcalf, Leigh, Spring, Jonathan M., Using science in cybersecurity, "Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles. This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity"--, Computer networks Security measures., Computer security. |
title |
Using science in cybersecurity |
title_auth |
Using science in cybersecurity |
title_full |
Using science in cybersecurity Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA |
title_fullStr |
Using science in cybersecurity Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA |
title_full_unstemmed |
Using science in cybersecurity Leigh Metcalf, Carnegie Mellon University, USA, Jonathan Spring, Carnegie Mellon University, USA |
title_short |
Using science in cybersecurity |
title_sort |
using science in cybersecurity |
topic |
Computer networks Security measures., Computer security. |
topic_facet |
Computer networks, Computer security., Security measures. |