Narrow your search

Library

UMons (2)

KBC (1)

KU Leuven (1)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

UGent (1)

ULB (1)

More...

Resource type

book (2)


Language

English (2)


Year
From To Submit

2017 (1)

2001 (1)

Listing 1 - 2 of 2
Sort by
Emerging financial markets
Authors: ---
ISBN: 0072425148 9780072425147 Year: 2001 Publisher: Boston (Mass.): McGraw-Hill,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Research methods for cyber security
Authors: ---
ISBN: 0128129301 0128053496 9780128129302 9780128053492 Year: 2017 Publisher: Cambridge, Massachusetts : Syngress, an imprint of Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage

Listing 1 - 2 of 2
Sort by