Research methods for cyber security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress
[2017]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xxi, 404 Seiten Illustrationen 24 cm |
ISBN: | 9780128053492 0128053496 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044447107 | ||
003 | DE-604 | ||
005 | 20211018 | ||
007 | t | ||
008 | 170811s2017 a||| b||| 00||| eng d | ||
020 | |a 9780128053492 |9 978-0-12-805349-2 | ||
020 | |a 0128053496 |9 0-12-805349-6 | ||
035 | |a (OCoLC)1002255535 | ||
035 | |a (DE-599)BVBBV044447107 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-1046 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Edgar, Thomas W. |e Verfasser |0 (DE-588)1135593914 |4 aut | |
245 | 1 | 0 | |a Research methods for cyber security |c Thomas W. Edgar, David O. Manz |
264 | 1 | |a Cambridge, MA |b Syngress |c [2017] | |
300 | |a xxi, 404 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Forschungsmethode |0 (DE-588)4155046-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security / Study and teaching | |
653 | 0 | |a Computer security / Study and teaching | |
689 | 0 | 0 | |a Forschungsmethode |0 (DE-588)4155046-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Forschungsmethode |0 (DE-588)4155046-8 |D s |
689 | 1 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Manz, David O. |e Sonstige |0 (DE-588)1135594058 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029848203&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029848203 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177760866795520 |
---|---|
adam_text | Contents
ABOUT THE AUTHORS......................................................xv
FOREWORD...............................................................xvii
PREFACE................................................................xix
ACKNOWLEDGMENTS..................................................... xxiii
Part I Introduction
CHAPTER 1 Introduction to Science.......................................3
Mark Tardiff
Chapter Objectives.........................................4
What Is Science.......................................... 4
Types of Science...........................................5
Science Is Messy......................................... 6
Hierarchy of Evidence...................................9
From Ptolemy to Einstein—Science and the Discovery
of the Nature of the Sky.................................10
A Science Continuum of Discovery.......................11
The Ptolemaic Model and Supporting Assumptions.........13
Was the Ptolemaic Model of the Solar System Useful?...16
Emergence of the Heliocentric Model....................16
Nicolaus Copernicus.................................. 17
Was the Copernican Model an Improvement?...............19
Johannes Kepler.................................... 19
Kepler s Contributions in the Context of the Science
Continuum of Discovery.................................21
Galileo Galilei........................................21
Galileo’s Contributions in the Context of the Science
Continuum of Discovery.................................23
Isaac Newton................................... 23
Newton’s Contributions in the Context of the Science
Continuum of Discovery.................................25
Albert Einstein...................................... 26
Are Einstein s Contributions an Improvement to
Understanding Planetary Motion?.................... 27
Contents
I
Einstein s Contributions in the Context of the Science
Continuum of Discovery........................................28
Summary and Conclusions..........................................29
Discovery in the Realm of Right and Wrong.....................30
Endnotes....................................................... 31
CHAPTER 2 Science and Cyber Security.......................................... 33
Chapter Objectives...............................................34
Defining Cyber Space.............................................34
Data Perspective .............................................34
Technology Perspective...................................... 35
Cybernetic Perspective.................................... 35
Defining Cyber Security..........................................36
Attributes of Cyber Security..................................37
Cyber Security Fundamentals......................................39
Vulnerability.................................................39
Exploit.......................................................39
Threat...................................................... 40
Threat Actor..................................................40
Threat Vector.................................................40
Attack........................................................40
Malware............................................... 40
Secure System Design Principles...............................41
Cyber Security Controls Overview........................... 43
Access Control................................................44
Situation Awareness...........................................45
Cryptography..................................................46
Host Security............................................. 49
Network Security..............................................50
Risk..........................................................50
Defining a Science of Cyber Security.............................51
Our Definition of a Cyber Security Science....................52
Challenges in Achieving Security in Cyber Space..................55
Further Reading..................................................57
Attack Detection ........................................... 57
Secure Mechanism Design.......................................57
Software Security......................................... 57
Malware/Threat Analysis..................................... 57
Risk Management...............................................58
Cryptography..................................................58
Endnotes.........................................................61
CHAPTER 3 Starting Your Research.............................................. 63
Chapter Objectives...............................................65
Starting Your Research...........................................65
Contents
Initial Question Process................................ 67
Research Progression........................................68
Observational Research.................................. 70
Theoretical Research.................................... 71
Experimental Research................................. 73
Applied Research............................................74
Research Before the Research................................. 75
Selecting Your Research Path...................................78
Walking the Decision Tree...................................79
Observation Method Selection................................84
Theoretical Method Selection................................86
Experimental Method Selection............................. 87
Applied Method Selection....................................89
Conferences and Journals................................... 90
Endnotes..................................................... 91
Part II Observational Research Methods
CHAPTER U Exploratory Study...................................................95
Chapter Objectives..................................... 96
Knowledge by Inference....................................... 96
Types of Studies...............................................98
Exploratory Study..................................... 98
Gathering Data................................................100
Research Questions and Datasets........................ 102
Scales of Data.............................................103
Sample Size.............................................. 104
Dataset Sensitivities and Restrictions................... 109
Exploratory Method Selection................................ 109
Exploratory Study Method Examples.............................111
Case-control Example................................... 112
Ecological Example..................................... 114
Cross-sectional.......................................... 116
Longitudinal Example.......................................118
Analysis Bias.................................................121
The Search for a Causal Relationship ....................... 123
Graph Summarization...................................... 123
Descriptive Statistics.....................................123
Regression Analysis...................................... 124
Reporting Your Results.................................... 126
Sample Format..............................................127
Endnotes.................................................. 129
CHAPTER 5 Descriptive Study.............................................. 131
Chapter Objectives............................................132
Descriptive Study Methods.....................................132
Contents
Observation Method Selection...................................135
Gathering Data............................................... 135
Data Collection Methods....................................137
Data Analysis.............................................. 140
Coding Unstructured Data.....................................U1
Proportions.................................................141
Frequency Statistics......................................... 142
Descriptive Study Method Examples..............................142
Case Study........................................ 143
Elicitation Studies....................................... 145
Case Report.................................................147
Reporting Your Results....................................... 148
Sample Format............................................. 148
Endnotes..................................................... 151
CHAPTER 6 Machine Learning..................................................153
Satish Chikkagoudar, Samrat Chatterjee,
Dennis G. Thomas, Thomas E. Carroll, and George Muller
Chapter Objectives.............................................153
What is Machine Learning .................................... 154
Categories of Machine Learning.................................154
Debugging Machine Learning................................. 157
Bayesian Network Mathematical Preliminaries and Model
Properties.....................................................158
Strengths and Limitations...................................158
Data-driven Learning and Probabilistic Inference
within Bayesian Networks....................................159
Parameter Learning..........................................159
Probabilistic Inference.....................................160
Notional Example with bnlearn Package in R..................160
Hidden Markov Models......................................... 165
Notional Example with HMM Package in R......................167
Discussion.....................................................169
Sample Format............................................ 169
Abstract.................................................. 169
Introduction.............................................. 170
Related Work.............................................. 170
Approach.................................................. 170
Evaluation..................................................170
Data Analysis/Results.......................................171
Discussion/Future Work......................................171
Conclusion/Summary........................................ 171
Acknowledgments.............................................171
References..................................................171
Endnotes............................................. 172
Contents
Part III Mathematical Research Methods
CHAPTER 7 Theoretical Research................................................177
Thomas E. Carroll
Chapter Objectives........................................... 177
Background.....................................................177
Characteristics of a Good Theory............................179
Challenges in Development of Cyber Security Science Theory....180
Identify Insight............................................181
Determine Relevant Factors ............................. 182
Formally Define Theory......................................182
Test for Internal Consistency...............................183
Test for External Consistency............................. 183
Refute......................................................184
Continue to Seek Refinements................................184
Example Theoretical Research Construction......................184
Reporting Your Results.........................................188
Sample Format...............................................188
Endnotes..................................................... 191
CHAPTER 8 Using Simulation for Research.......................................193
Chapter Objectives.............................................194
Defining Simulation.......................................... 194
When Should Simulation Be Used.................................196
Theoretical Simulations.....................................196
Simulation for Decision Support........................... 197
Empirical Simulation........................................197
Synthetic Conditions........................................198
Cautions of Simulation Use..................................199
Defining What to Model.........................................199
Model Validity..............................................201
Instantiating a Model..........................................202
Types of Simulation..................................... 203
Example Use Case............................................. 207
Paper Format...................................................210
Endnotes................................................... 210
Part IV Experimental Research Methods
CHAPTER 9 Hypothetico-deductive Research...............................215
Chapter Objectives...........................................215
Purpose of Hypothesis-Driven Experimentation............... 215
Contents
Turn Inductive Process Into Deductive Process..............216
Reject a Theory or Build Evidence Strengthening............217
Specify What You Think is Involved; Challenge Assumptions .... 217
Define a Process by Which Others can Replicate and
Reproduce the Effect; to Test and Ensure that Your
Own Approach is Valid......................................218
The Goal of Hypothetico-deductive Experimentation
is Different than Applied Experimentation..................218
A Proper Hypothesis...........................................219
Observable and Testable....................................219
Clearly Defined.......................................... 220
Single Concept.............................................221
Predictive.................................................222
Generating a Hypothesis from a Theory......................222
Experimentation...............................................224
Dependent Variables (Measured Variables]................. 226
Independent Variables (Controls)...........................228
Experimental Design...................................... 232
Analysis.................................................... 239
Hypothesis Testing.........................................239
Integrating the Theory with Results...........................244
Reporting Your Results........................................245
Sample Format..............................................245
Endnotes......................................................248
CHAPTER 10 Quasi-experimental Research.................................... 251
Chapter Objectives......................................... 252
True versus Quasi-experiment.................................252
Cyber Drivers for Quasi-experimental Design..................253
Quasi-experiment Research Methods.......................... 255
Difference-of-differences Design........................ 255
Time Series Design...................................... 240
Cohort Design.............................................264
Reporting Your Results.......................................268
Endnotes.............................................. .....268
Part V Applied Research Methods
CHAPTER 11 Applied Experimentation.........................................271
Chapter Objectives..................................... 272
Building From a Theory.....................................272
Methods of Applied Experimentation....................... 273
Benchmarking...............................................274
Collecting or Defining a Benchmark......................276
Running the Benchmark...................................279
Contents
Analyzing the Results................................... 280
Problems With Benchmarking.............................. 283
Reporting Your Results.......................................284
Sample Format.............................................284
Validation Testing.................................... ....287
Independent Variables........................................289
Dependent Variables.................................... ....289
Experimental Design..........................................290
Problems With Validation Testing......................... 292
Reporting Your Results.......................................293
Sample Format........................................... 294
Endnotes................................................... 297
CHAPTER 12 Applied Observational Study..................................... 299
Chapter Objectives...........................................300
Applied Study Types ................................... 300
Applied Exploratory Studies...............................301
Applied Descriptive Study.................................304
Applied Observation Method Selection.........................306
Data Collection and Analysis.................................306
Applied Exploratory Studies...............................306
Applied Descriptive Studies...............................307
Applied Exploratory Study: Stress Test.......................307
System.............................................. 308
Behavior..................................................308
Testing Methodology.......................................309
Applied Descriptive Study: Case Study...................... 311
Reporting Your Results.......................................313
Sample Format....................................... 314
Endnote......................................................317
Part VI Additional Materials
CHAPTER 13 Instrumentation................................................321
Chapter Objectives.........................................322
Understanding Your Data Needs..............................322
Fidelity................................................323
Types...................................................326
Amount..................................................326
Source location.........................................327
Difference between Operational and Scientific
Measurements............................................327
Overview of Data and Sensor Types..........................328
Host-based Sensors......................................328
Network-based Sensors...................................330
Contents
I
Hardware Sensors........................................ 331
Physical Sensors........................................ 332
Honeypots............................................... 333
Centralized Collectors....................................334
Data Formats............................................ 334
Sensor Calibration........................................337
Controlled-Testing Environments.......................... 338
Conclusion...................................................342
Endnotes................................................. 342
CHAPTER 14 Addressing the Adversary........................................ 345
Chapter Objectives...........................................346
Defining Adversary...........................................346
The Challenge of Adversarial Research........................348
Adversaries in Other Fields of Study.........................353
Different Ways to Think About Threats...................... 356
Adversary Perspective............................. ..357
Defining Adversaries as Threats...........................358
Attribution................................... ........359
integrating Adversary Models into Research...................359
Approaches................................................360
Challenges................................................361
Conclusions..................................................365
Endnotes.......................................... .....365
CHAPTER 15 Scientific Ethics............................................... 367
Chapter Objectives....................................... ..367
Ethics for Science...........................................367
History of Ethics in Cyber Security..........................371
Ethical Standards........................................ 374
Association for Computing Machinery..................... 374
institute of Electrical and Electronics Engineers.........376
IEEE Code of Ethics..................................... 376
Ten Commandments of Computer Ethics.......................377
Certification Bodies Ethics...............................378
Cyber Security Expert Classification.........................378
Cyber Security and the Law...................................379
United States.............................................379
Canada....................................................380
United Kingdom.......................................... 381
France....................................................381
European Union............................................381
Japan.....................................................381
South Korea............................................. 382
Contents
Human Subjects Research.........................................382
Institutional Review Board..................................383
Ethical Use of Data................................... .....384-
Consent................................................... 385
Criminally Released Data................................ 386
Individual Responsibility..................................... 387
Plagiarism................................................ 387
Authorship..................................................388
Conclusion......................................................389
Endnotes................................................ 389
INDEX...........................................................................393
|
any_adam_object | 1 |
author | Edgar, Thomas W. |
author_GND | (DE-588)1135593914 (DE-588)1135594058 |
author_facet | Edgar, Thomas W. |
author_role | aut |
author_sort | Edgar, Thomas W. |
author_variant | t w e tw twe |
building | Verbundindex |
bvnumber | BV044447107 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1002255535 (DE-599)BVBBV044447107 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01974nam a2200469 c 4500</leader><controlfield tag="001">BV044447107</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211018 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170811s2017 a||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128053492</subfield><subfield code="9">978-0-12-805349-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128053496</subfield><subfield code="9">0-12-805349-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002255535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044447107</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-1046</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Edgar, Thomas W.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1135593914</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research methods for cyber security</subfield><subfield code="c">Thomas W. Edgar, David O. Manz</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 404 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Forschungsmethode</subfield><subfield code="0">(DE-588)4155046-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Study and teaching</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Study and teaching</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Forschungsmethode</subfield><subfield code="0">(DE-588)4155046-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Forschungsmethode</subfield><subfield code="0">(DE-588)4155046-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manz, David O.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1135594058</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029848203&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029848203</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044447107 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:53:12Z |
institution | BVB |
isbn | 9780128053492 0128053496 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029848203 |
oclc_num | 1002255535 |
open_access_boolean | |
owner | DE-739 DE-1046 |
owner_facet | DE-739 DE-1046 |
physical | xxi, 404 Seiten Illustrationen 24 cm |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Syngress |
record_format | marc |
spelling | Edgar, Thomas W. Verfasser (DE-588)1135593914 aut Research methods for cyber security Thomas W. Edgar, David O. Manz Cambridge, MA Syngress [2017] xxi, 404 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier Internet (DE-588)4308416-3 gnd rswk-swf Forschungsmethode (DE-588)4155046-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Computer security / Study and teaching Forschungsmethode (DE-588)4155046-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Internet (DE-588)4308416-3 s Sicherheit (DE-588)4054790-5 s 1\p DE-604 Manz, David O. Sonstige (DE-588)1135594058 oth Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029848203&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Edgar, Thomas W. Research methods for cyber security Internet (DE-588)4308416-3 gnd Forschungsmethode (DE-588)4155046-8 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4155046-8 (DE-588)4274324-2 (DE-588)4054790-5 |
title | Research methods for cyber security |
title_auth | Research methods for cyber security |
title_exact_search | Research methods for cyber security |
title_full | Research methods for cyber security Thomas W. Edgar, David O. Manz |
title_fullStr | Research methods for cyber security Thomas W. Edgar, David O. Manz |
title_full_unstemmed | Research methods for cyber security Thomas W. Edgar, David O. Manz |
title_short | Research methods for cyber security |
title_sort | research methods for cyber security |
topic | Internet (DE-588)4308416-3 gnd Forschungsmethode (DE-588)4155046-8 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | Internet Forschungsmethode Computersicherheit Sicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029848203&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT edgarthomasw researchmethodsforcybersecurity AT manzdavido researchmethodsforcybersecurity |