If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.
Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments.
"Sinopsis" puede pertenecer a otra edición de este libro.
Josiah Dykstra is a Senior Researcher at the Department of Defense. Dykstra received his PhD in Computer Science from the University of Maryland, Baltimore County, researching the technical and legal challenges of digital forensics for cloud computing. He is known in the DoD and forensics communities for his work on network security, intrusion detection, malware analysis, digital forensics, and cloud computing. He is a member of the ACM, IEEE, American Academy of Forensic Sciences, Cloud Security Alliance, and American Bar Association.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 9,25 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoEUR 0,75 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: WO-9781491920947
Cantidad disponible: 1 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: WO-9781491920947
Cantidad disponible: 1 disponibles
Librería: AwesomeBooks, Wallingford, Reino Unido
Paperback. Condición: Very Good. Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. . Nº de ref. del artículo: 7719-9781491920947
Cantidad disponible: 1 disponibles
Librería: Bahamut Media, Reading, Reino Unido
Paperback. Condición: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. Nº de ref. del artículo: 6545-9781491920947
Cantidad disponible: 1 disponibles
Librería: Speedyhen, London, Reino Unido
Condición: NEW. Nº de ref. del artículo: NW9781491920947
Cantidad disponible: 2 disponibles
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9781491920947_new
Cantidad disponible: 3 disponibles
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Condición: New. Applying the scientific method to security is about using techniques to observe, measure, experiment, form explanations, test, and evaluate security processes in software. This practical book shows how incorporating these techniques will provide developers with the knowledge to produce more secure and more valuable products and services. Num Pages: 182 pages. BIC Classification: UR. Category: (XV) Technical / Manuals. Dimension: 250 x 150 x 15. Weight in Grams: 666. . 2016. 1st Edition. Paperback. . . . . Nº de ref. del artículo: V9781491920947
Cantidad disponible: 2 disponibles
Librería: Rarewaves.com UK, London, Reino Unido
Paperback. Condición: New. If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments.Learn the steps necessary to conduct scientific experiments in cybersecurity Explore fuzzing to test how your software handles various inputs Measure the performance of the Snort intrusion detection system Locate malicious "needles in a haystack" in your network and IT environment Evaluate cryptography design and application in IoT products Conduct an experiment to identify relationships between similar malware binaries Understand system-level security requirements for enterprise networks and web services. Nº de ref. del artículo: LU-9781491920947
Cantidad disponible: 1 disponibles
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
Paperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. 348. Nº de ref. del artículo: B9781491920947
Cantidad disponible: 1 disponibles
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
Paperback. Condición: New. If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments.Learn the steps necessary to conduct scientific experiments in cybersecurity Explore fuzzing to test how your software handles various inputs Measure the performance of the Snort intrusion detection system Locate malicious "needles in a haystack" in your network and IT environment Evaluate cryptography design and application in IoT products Conduct an experiment to identify relationships between similar malware binaries Understand system-level security requirements for enterprise networks and web services. Nº de ref. del artículo: LU-9781491920947
Cantidad disponible: 1 disponibles