Using Science in Cybersecurity (Record no. 814516)

MARC details
000 -LEADER
fixed length control field 01587nam a22002537a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240118s2021 |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789811235856
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER
ISSN-L 9789811235856
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number MET
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Metcalf, Leigh
9 (RLIN) 879330
Relator term author
245 ## - TITLE STATEMENT
Title Using Science in Cybersecurity
250 ## - EDITION STATEMENT
Edition statement 1st
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Hackensack, NJ :
Name of publisher, distributor, etc. World Scientific,
Date of publication, distribution, etc. c2021
300 ## - PHYSICAL DESCRIPTION
Extent x, 291 p.
Other physical details : ill
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes Bibliographical References and Index
520 ## - SUMMARY, ETC.
Summary, etc. SUMMARY<br/>Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles.<br/>This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. <br/>Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity.<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 19
Topical term or geographic name entry element Computer Networks Security Measures
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 151656
Topical term or geographic name entry element Computer Security
700 ## - ADDED ENTRY--PERSONAL NAME
Relator term author
Personal name Spring, Jonathan
9 (RLIN) 880038
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text TOC
Uniform Resource Identifier <a href="https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9789811235856.pdf">https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9789811235856.pdf</a>
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text WEB LINK
Uniform Resource Identifier <a href="https://www.worldscientific.com/worldscibooks/10.1142/12247#t=aboutBook">https://www.worldscientific.com/worldscibooks/10.1142/12247#t=aboutBook</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Physical Form Damaged status Not for loan Purchased by Department/Discipline Home library Current library Shelving location Date acquired Source of acquisition Stock Type Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Budget Year Cost, replacement price Accession Date Koha item type
    Dewey Decimal Classification Text, Hardcover     Department of Materials Engineering Reference Section Reference Section Reference Section 08/01/2024 24 Purchased 20902.25   005.8 MET 98549 08/01/2024 2023-24 20902.24 08/01/2024 Reference Collection