Using Science in Cybersecurity (Record no. 814516)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01587nam a22002537a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240118s2021 |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789811235856 |
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER | |
ISSN-L | 9789811235856 |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | MET |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Metcalf, Leigh |
9 (RLIN) | 879330 |
Relator term | author |
245 ## - TITLE STATEMENT | |
Title | Using Science in Cybersecurity |
250 ## - EDITION STATEMENT | |
Edition statement | 1st |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Hackensack, NJ : |
Name of publisher, distributor, etc. | World Scientific, |
Date of publication, distribution, etc. | c2021 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | x, 291 p. |
Other physical details | : ill |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes Bibliographical References and Index |
520 ## - SUMMARY, ETC. | |
Summary, etc. | SUMMARY<br/>Deploying the scientific method in cybersecurity today is a common-sense approach that is a tough topic in the field of cybersecurity. While most publications in the field emphasize that scientific principles are necessary, there are very few, if any, guides that uncover these principles.<br/>This book will give readers practical tools for cybersecurity. It examines the path of developing cybersecurity foundations while taking into account uncertain data. Extensive examples demonstrate how to deploy cybersecurity to sort our day-to-day problems. <br/>Using Science in Cybersecurity is intended for advanced undergraduate and graduate students, researchers and practitioners in the fields of cybersecurity, information security, and science of cybersecurity.<br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 19 |
Topical term or geographic name entry element | Computer Networks Security Measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
9 (RLIN) | 151656 |
Topical term or geographic name entry element | Computer Security |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Relator term | author |
Personal name | Spring, Jonathan |
9 (RLIN) | 880038 |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Link text | TOC |
Uniform Resource Identifier | <a href="https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9789811235856.pdf">https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9789811235856.pdf</a> |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Link text | WEB LINK |
Uniform Resource Identifier | <a href="https://www.worldscientific.com/worldscibooks/10.1142/12247#t=aboutBook">https://www.worldscientific.com/worldscibooks/10.1142/12247#t=aboutBook</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Physical Form | Damaged status | Not for loan | Purchased by Department/Discipline | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Stock Type | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Budget Year | Cost, replacement price | Accession Date | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Text, Hardcover | Department of Materials Engineering | Reference Section | Reference Section | Reference Section | 08/01/2024 | 24 | Purchased | 20902.25 | 005.8 MET | 98549 | 08/01/2024 | 2023-24 | 20902.24 | 08/01/2024 | Reference Collection |