Book description
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game.
Publisher resources
Table of contents
- Preface
- 1. Introduction to Cybersecurity Science
- 2. Conducting Your Own Cybersecurity Experiments
- 3. Cybersecurity Experimentation and Test Environments
- 4. Software Assurance
- 5. Intrusion Detection and Incident Response
- 6. Situational Awareness and Data Analytics
-
7. Cryptography
- An Example Scientific Experiment in Cryptography
- Experimental Evaluation of Cryptographic Designs and Implementation
- Provably Secure Cryptography and Security Assumptions
- Cryptographic Security and the Internet of Things
- Case Study: Evaluating Composable Security
- How to Find More Information
- Conclusion
- References
- 8. Digital Forensics
- 9. Malware Analysis
- 10. System Security Engineering
- 11. Human-Computer Interaction and Usable Security
- 12. Visualization
- A. Understanding Bad Science, Scientific Claims, and Marketing Hype
- Index
Product information
- Title: Essential Cybersecurity Science
- Author(s):
- Release date: December 2015
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491920947
You might also like
book
Malware Data Science
"Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens …
book
Practical Malware Analysis
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …
book
Learning Malware Analysis
Understand malware analysis and its practical implementation About This Book Explore the key concepts of malware …