Theoretical cybersecurity: principles and advanced concepts
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York
Apress
[2022]
|
Schlagworte: | |
Zusammenfassung: | There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade—the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry’s past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities—as well as defensible experimentation concepts—are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations.What you’ll learn- The current state of the cybersecurity sector and how it constrains theoretical innovationHow to understand attacker and defender cost benefit - The detect, prevent, and accept paradigm- How to build your own cybersecurity box- Supporting cybersecurity innovation through defensible experimentation- How to implement strategic cybersecurity- Infinite vs finite game play in cybersecurityWho This Book Is ForThis book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities |
Beschreibung: | Chapter 1. Introduction to Strategic Cybersecurity; Discuss what strategic cybersecurity is; Discussion on how it is not cybersecurity strategy; ; Chapter 2. No one cares about cybersecurity; Real motivations; Consequences; How can cybersecurity help them in spite of themselves?; ; Chapter 3. Cost-Benefit & Cybersecurity; Cost-Benefit to the defender; Cost-Benefit to the attacker; ; Chapter 4. What is the box that is cybersecurity?; Where do we draw the line?; What are areas that should be abandoned; What are areas that should be explored; ; Chapter 5. The detect, prevent, accept paradigm; Outline the paradigm; Case studies; ; Chapter 6. Building your own cybersecurity box; What is out of the cyber domain: sim swapping, go daddy; What is likely to be your attacker; What is likely to be your loss; ; Chapter 7. Cybersecurity as a material ; Capability Analysis; Sourcing; Test and evaluation; Utilization; Deprecation; Failure analysis; ; Chapter 8. Cybersecurity as infrastructure; A comparison to electricity; How do we get there and what will it mean?; ; Chapter 9. Strategic Defensive Security; Detect; Identify; Monitor; Hunt; ; Chapter 10. Strategic Offensive Security; Penetration testing; Red Teaming; Reverse Red Teaming; ; Chapter 11. Strategic Assurance; Frameworks; Auditing; Case study; ; Chapter 12. Strategic cybersecurity in commercial sectors; The approach; Case study; ; Chapter 13. Strategic cybersecurity in accountable sectors; Healthcare approach; Case study; Financial approach; Case study; ; Chapter 14. Strategic Magic; AI; ML; Block Chain; ; Chapter 15. Looking Forward; Where is the theory-craft?; We need new ideas and paradigms as much as we need new technology; Why is it difficult for academia to evolve cybersecurity?; Especially offensive cybersecurity; What is wrong with cybersecurity currently in academics; Degree programs; Unrealistic expectations; Potential solutions; Why does industry often lack an academic approach? |
Beschreibung: | xvi, 213 Seiten Illustrationen 361 grams |
ISBN: | 9781484282991 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048446728 | ||
003 | DE-604 | ||
005 | 20221007 | ||
007 | t| | ||
008 | 220829s2022 xx a||| |||| 00||| eng d | ||
020 | |a 9781484282991 |9 978-1-4842-8299-1 | ||
024 | 3 | |a 9781484282991 | |
035 | |a (OCoLC)1347215931 | ||
035 | |a (DE-599)BVBBV048446728 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-83 | ||
100 | 1 | |a Oakley, Jacob G. |e Verfasser |0 (DE-588)1189767198 |4 aut | |
245 | 1 | 0 | |a Theoretical cybersecurity |b principles and advanced concepts |c Dr. Jacob G. Oakley, Michael Butler, Wayne York, Dr. Matthew Puckett, Dr. J. Louis Sewell |
264 | 1 | |a New York |b Apress |c [2022] | |
300 | |a xvi, 213 Seiten |b Illustrationen |c 361 grams | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Chapter 1. Introduction to Strategic Cybersecurity; Discuss what strategic cybersecurity is; Discussion on how it is not cybersecurity strategy; ; Chapter 2. No one cares about cybersecurity; Real motivations; Consequences; How can cybersecurity help them in spite of themselves?; ; Chapter 3. Cost-Benefit & Cybersecurity; Cost-Benefit to the defender; Cost-Benefit to the attacker; ; Chapter 4. What is the box that is cybersecurity?; Where do we draw the line?; What are areas that should be abandoned; What are areas that should be explored; ; Chapter 5. The detect, prevent, accept paradigm; Outline the paradigm; Case studies; ; Chapter 6. Building your own cybersecurity box; What is out of the cyber domain: sim swapping, go daddy; What is likely to be your attacker; What is likely to be your loss; ; Chapter 7. Cybersecurity as a material ; Capability Analysis; Sourcing; Test and evaluation; Utilization; Deprecation; Failure analysis; ; Chapter 8. Cybersecurity as infrastructure; A comparison to electricity; How do we get there and what will it mean?; ; Chapter 9. Strategic Defensive Security; Detect; Identify; Monitor; Hunt; ; Chapter 10. Strategic Offensive Security; Penetration testing; Red Teaming; Reverse Red Teaming; ; Chapter 11. Strategic Assurance; Frameworks; Auditing; Case study; ; Chapter 12. Strategic cybersecurity in commercial sectors; The approach; Case study; ; Chapter 13. Strategic cybersecurity in accountable sectors; Healthcare approach; Case study; Financial approach; Case study; ; Chapter 14. Strategic Magic; AI; ML; Block Chain; ; Chapter 15. Looking Forward; Where is the theory-craft?; We need new ideas and paradigms as much as we need new technology; Why is it difficult for academia to evolve cybersecurity?; Especially offensive cybersecurity; What is wrong with cybersecurity currently in academics; Degree programs; Unrealistic expectations; Potential solutions; Why does industry often lack an academic approach? | ||
520 | |a There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade—the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. | ||
520 | |a Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry’s past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities—as well as defensible experimentation concepts—are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. | ||
520 | |a Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations.What you’ll learn- The current state of the cybersecurity sector and how it constrains theoretical innovationHow to understand attacker and defender cost benefit - The detect, prevent, and accept paradigm- How to build your own cybersecurity box- Supporting cybersecurity innovation through defensible experimentation- How to implement strategic cybersecurity- Infinite vs finite game play in cybersecurityWho This Book Is ForThis book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities | ||
650 | 4 | |a Data protection | |
653 | |a Hardcover, Softcover / Informatik, EDV/Informatik | ||
700 | 1 | |a Butler, Michael |e Verfasser |4 aut | |
700 | 1 | |a York, Wayne |e Verfasser |4 aut | |
700 | 1 | |a Puckett, Matthew |e Verfasser |4 aut | |
700 | 1 | |a Sewell, J. Louis |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-4842-8300-4 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033824949 |
Datensatz im Suchindex
_version_ | 1817582799166636032 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Oakley, Jacob G. Butler, Michael York, Wayne Puckett, Matthew Sewell, J. Louis |
author_GND | (DE-588)1189767198 |
author_facet | Oakley, Jacob G. Butler, Michael York, Wayne Puckett, Matthew Sewell, J. Louis |
author_role | aut aut aut aut aut |
author_sort | Oakley, Jacob G. |
author_variant | j g o jg jgo m b mb w y wy m p mp j l s jl jls |
building | Verbundindex |
bvnumber | BV048446728 |
ctrlnum | (OCoLC)1347215931 (DE-599)BVBBV048446728 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV048446728</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221007</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">220829s2022 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484282991</subfield><subfield code="9">978-1-4842-8299-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781484282991</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1347215931</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048446728</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oakley, Jacob G.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1189767198</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theoretical cybersecurity</subfield><subfield code="b">principles and advanced concepts</subfield><subfield code="c">Dr. Jacob G. Oakley, Michael Butler, Wayne York, Dr. Matthew Puckett, Dr. J. Louis Sewell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Apress</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 213 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">361 grams</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1. Introduction to Strategic Cybersecurity; Discuss what strategic cybersecurity is; Discussion on how it is not cybersecurity strategy; ; Chapter 2. No one cares about cybersecurity; Real motivations; Consequences; How can cybersecurity help them in spite of themselves?; ; Chapter 3. Cost-Benefit & Cybersecurity; Cost-Benefit to the defender; Cost-Benefit to the attacker; ; Chapter 4. What is the box that is cybersecurity?; Where do we draw the line?; What are areas that should be abandoned; What are areas that should be explored; ; Chapter 5. The detect, prevent, accept paradigm; Outline the paradigm; Case studies; ; Chapter 6. Building your own cybersecurity box; What is out of the cyber domain: sim swapping, go daddy; What is likely to be your attacker; What is likely to be your loss; ; Chapter 7. Cybersecurity as a material ; Capability Analysis; Sourcing; Test and evaluation; Utilization; Deprecation; Failure analysis; ; Chapter 8. Cybersecurity as infrastructure; A comparison to electricity; How do we get there and what will it mean?; ; Chapter 9. Strategic Defensive Security; Detect; Identify; Monitor; Hunt; ; Chapter 10. Strategic Offensive Security; Penetration testing; Red Teaming; Reverse Red Teaming; ; Chapter 11. Strategic Assurance; Frameworks; Auditing; Case study; ; Chapter 12. Strategic cybersecurity in commercial sectors; The approach; Case study; ; Chapter 13. Strategic cybersecurity in accountable sectors; Healthcare approach; Case study; Financial approach; Case study; ; Chapter 14. Strategic Magic; AI; ML; Block Chain; ; Chapter 15. Looking Forward; Where is the theory-craft?; We need new ideas and paradigms as much as we need new technology; Why is it difficult for academia to evolve cybersecurity?; Especially offensive cybersecurity; What is wrong with cybersecurity currently in academics; Degree programs; Unrealistic expectations; Potential solutions; Why does industry often lack an academic approach?</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade—the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry’s past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities—as well as defensible experimentation concepts—are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations.What you’ll learn- The current state of the cybersecurity sector and how it constrains theoretical innovationHow to understand attacker and defender cost benefit - The detect, prevent, and accept paradigm- How to build your own cybersecurity box- Supporting cybersecurity innovation through defensible experimentation- How to implement strategic cybersecurity- Infinite vs finite game play in cybersecurityWho This Book Is ForThis book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardcover, Softcover / Informatik, EDV/Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Butler, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">York, Wayne</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Puckett, Matthew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sewell, J. Louis</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4842-8300-4</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033824949</subfield></datafield></record></collection> |
id | DE-604.BV048446728 |
illustrated | Illustrated |
index_date | 2024-07-03T20:29:26Z |
indexdate | 2024-12-05T07:00:32Z |
institution | BVB |
isbn | 9781484282991 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033824949 |
oclc_num | 1347215931 |
open_access_boolean | |
owner | DE-29T DE-83 |
owner_facet | DE-29T DE-83 |
physical | xvi, 213 Seiten Illustrationen 361 grams |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Apress |
record_format | marc |
spelling | Oakley, Jacob G. Verfasser (DE-588)1189767198 aut Theoretical cybersecurity principles and advanced concepts Dr. Jacob G. Oakley, Michael Butler, Wayne York, Dr. Matthew Puckett, Dr. J. Louis Sewell New York Apress [2022] xvi, 213 Seiten Illustrationen 361 grams txt rdacontent n rdamedia nc rdacarrier Chapter 1. Introduction to Strategic Cybersecurity; Discuss what strategic cybersecurity is; Discussion on how it is not cybersecurity strategy; ; Chapter 2. No one cares about cybersecurity; Real motivations; Consequences; How can cybersecurity help them in spite of themselves?; ; Chapter 3. Cost-Benefit & Cybersecurity; Cost-Benefit to the defender; Cost-Benefit to the attacker; ; Chapter 4. What is the box that is cybersecurity?; Where do we draw the line?; What are areas that should be abandoned; What are areas that should be explored; ; Chapter 5. The detect, prevent, accept paradigm; Outline the paradigm; Case studies; ; Chapter 6. Building your own cybersecurity box; What is out of the cyber domain: sim swapping, go daddy; What is likely to be your attacker; What is likely to be your loss; ; Chapter 7. Cybersecurity as a material ; Capability Analysis; Sourcing; Test and evaluation; Utilization; Deprecation; Failure analysis; ; Chapter 8. Cybersecurity as infrastructure; A comparison to electricity; How do we get there and what will it mean?; ; Chapter 9. Strategic Defensive Security; Detect; Identify; Monitor; Hunt; ; Chapter 10. Strategic Offensive Security; Penetration testing; Red Teaming; Reverse Red Teaming; ; Chapter 11. Strategic Assurance; Frameworks; Auditing; Case study; ; Chapter 12. Strategic cybersecurity in commercial sectors; The approach; Case study; ; Chapter 13. Strategic cybersecurity in accountable sectors; Healthcare approach; Case study; Financial approach; Case study; ; Chapter 14. Strategic Magic; AI; ML; Block Chain; ; Chapter 15. Looking Forward; Where is the theory-craft?; We need new ideas and paradigms as much as we need new technology; Why is it difficult for academia to evolve cybersecurity?; Especially offensive cybersecurity; What is wrong with cybersecurity currently in academics; Degree programs; Unrealistic expectations; Potential solutions; Why does industry often lack an academic approach? There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade—the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry’s past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities—as well as defensible experimentation concepts—are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations.What you’ll learn- The current state of the cybersecurity sector and how it constrains theoretical innovationHow to understand attacker and defender cost benefit - The detect, prevent, and accept paradigm- How to build your own cybersecurity box- Supporting cybersecurity innovation through defensible experimentation- How to implement strategic cybersecurity- Infinite vs finite game play in cybersecurityWho This Book Is ForThis book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities Data protection Hardcover, Softcover / Informatik, EDV/Informatik Butler, Michael Verfasser aut York, Wayne Verfasser aut Puckett, Matthew Verfasser aut Sewell, J. Louis Verfasser aut Erscheint auch als Online-Ausgabe 978-1-4842-8300-4 |
spellingShingle | Oakley, Jacob G. Butler, Michael York, Wayne Puckett, Matthew Sewell, J. Louis Theoretical cybersecurity principles and advanced concepts Data protection |
title | Theoretical cybersecurity principles and advanced concepts |
title_auth | Theoretical cybersecurity principles and advanced concepts |
title_exact_search | Theoretical cybersecurity principles and advanced concepts |
title_exact_search_txtP | Theoretical cybersecurity principles and advanced concepts |
title_full | Theoretical cybersecurity principles and advanced concepts Dr. Jacob G. Oakley, Michael Butler, Wayne York, Dr. Matthew Puckett, Dr. J. Louis Sewell |
title_fullStr | Theoretical cybersecurity principles and advanced concepts Dr. Jacob G. Oakley, Michael Butler, Wayne York, Dr. Matthew Puckett, Dr. J. Louis Sewell |
title_full_unstemmed | Theoretical cybersecurity principles and advanced concepts Dr. Jacob G. Oakley, Michael Butler, Wayne York, Dr. Matthew Puckett, Dr. J. Louis Sewell |
title_short | Theoretical cybersecurity |
title_sort | theoretical cybersecurity principles and advanced concepts |
title_sub | principles and advanced concepts |
topic | Data protection |
topic_facet | Data protection |
work_keys_str_mv | AT oakleyjacobg theoreticalcybersecurityprinciplesandadvancedconcepts AT butlermichael theoreticalcybersecurityprinciplesandadvancedconcepts AT yorkwayne theoreticalcybersecurityprinciplesandadvancedconcepts AT puckettmatthew theoreticalcybersecurityprinciplesandadvancedconcepts AT sewelljlouis theoreticalcybersecurityprinciplesandadvancedconcepts |