Table of Contents
1. Product details
2. Book Description
3. Key Features
4. What You Will Learn?
5. Who this Book is for?
6. About the Author
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
Author: Josiah Dykstra
Published date: January 2016
Premium
Product details
Publisher : Oreilly & Associates Inc; 1st edition (January 1, 2016)
Language : English
Paperback : 174 pages
ISBN-10 : 1491920947
ISBN-13 : 978-1491920947
Item Weight : 1.47 pounds
Dimensions : 5.91 x 0.59 x 9.84 inches
Book Description
"Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems" is a practical guide written by Josiah Dykstra that teaches readers how to apply the scientific method when assessing techniques for protecting information systems. The book is designed for software developers, forensic investigators, and network administrators who want to conduct scientific experiments on everyday tools and procedures, whether they are evaluating corporate security systems, testing their own security products, or looking for bugs in a mobile game.
The book starts by introducing readers to the scientific method and then focuses on standalone, domain-specific topics such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments.
Key Features
Teaches readers how to apply the scientific method when assessing techniques for protecting information systems
Focuses on standalone, domain-specific topics such as cryptography, malware analysis, and system security engineering
Includes practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments
What You Will Learn?
The steps necessary to conduct scientific experiments in cybersecurity
How to use fuzzing to test how your software handles various inputs
How to measure the performance of the Snort intrusion detection system
How to locate malicious "needles in a haystack" in your network and IT environment
How to evaluate cryptography design and application in IoT products
How to conduct an experiment to identify relationships between similar malware binaries
How to understand system-level security requirements for enterprise networks and web services
Who this Book is for?
This book is designed for software developers, forensic investigators, and network administrators who want to apply the scientific method when assessing techniques for protecting information systems. It is suitable for anyone involved in cybersecurity who wants to conduct scientific experiments on everyday tools and procedures.
About the Author
Dr. Josiah Dykstra is a Senior Researcher at the Department of Defense. He received his PhD in Computer Science from the University of Maryland, Baltimore County, researching the technical and legal challenges of digital forensics for cloud computing. He is known in the DoD and forensics communities for his work on network security, intrusion detection, malware analysis, digital forensics, and cloud computing. He is a member of the ACM, IEEE, American Academy of Forensic Sciences, Cloud Security Alliance, and American Bar Association.
Disclaimer: This page contains affiliate links. By making a purchase through these links, we may earn a commission at no extra cost to you. Visit Affiliate Program page for more details Thank you!
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
Author: Josiah Dykstra
Published date: January 2016
Premium
November 23, 2024
Navigating the Cybersecurity Career Path
"Navigating the Cybersecurity Career Path" provides a comprehensive guide for individuals looking to start, advance, and lead successful careers in the cybersecurity industry.
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
Essential Cybersecurity Science provides a practical guide for applying the scientific method to assess and improve the security of information systems.
Hands-On Artificial Intelligence for Cybersecurity
"Hands-On Artificial Intelligence for Cybersecurity" empowers readers with practical knowledge to develop intelligent systems that detect threats and fortify network security using AI.
Principles of Information Security (MindTap Course List) 7th Edition
"Principles of Information Security" provides a comprehensive understanding of information security concepts, practices, and strategies essential for students and professionals in today's digital landscape.
Learn Something New with Free Email subscription
Learn Something New with Free Email subscription
Subscribe
Subscribe
Subscribe
Subscribe
Navigating the Cybersecurity Career Path
"Navigating the Cybersecurity Career Path" provides a comprehensive guide for individuals looking to start, advance, and lead successful careers in the cybersecurity industry.
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
Essential Cybersecurity Science provides a practical guide for applying the scientific method to assess and improve the security of information systems.
Hands-On Artificial Intelligence for Cybersecurity
"Hands-On Artificial Intelligence for Cybersecurity" empowers readers with practical knowledge to develop intelligent systems that detect threats and fortify network security using AI.
Principles of Information Security (MindTap Course List) 7th Edition
"Principles of Information Security" provides a comprehensive understanding of information security concepts, practices, and strategies essential for students and professionals in today's digital landscape.