As we analyzed the example in the previous chapter, it becomes apparent that there is inherently a problem with the outcomes of research when it is done by people with the wrong context, knowledge experience, or backgrounds. In this chapter, we will explore what sort of people make the right choice when theoretical cybersecurity work, thought, and innovation are necessary. First though, ...
© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
J. G. Oakley et al.Theoretical Cybersecurityhttps://doi.org/10.1007/978-1-4842-8300-4_22. A Cyber Taxonomy
(1)
Owens Cross Roads, AL, USA
(2)
Arlington, VA, USA
(3)
Huntsville, AL, USA
Get Theoretical Cybersecurity: Principles and Advanced Concepts now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.