Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
ISBN-10
1491921064
ISBN-13
9781491921067
Category
Computers
Pages
190
Language
English
Published
2015-12-08
Publisher
"O'Reilly Media, Inc."
Author
Josiah Dykstra

Description

If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether you’re evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics, such as cryptography, malware analysis, and system security engineering. The latter chapters include practical case studies that demonstrate how to use available tools to conduct domain-specific scientific experiments. Learn the steps necessary to conduct scientific experiments in cybersecurity Explore fuzzing to test how your software handles various inputs Measure the performance of the Snort intrusion detection system Locate malicious “needles in a haystack” in your network and IT environment Evaluate cryptography design and application in IoT products Conduct an experiment to identify relationships between similar malware binaries Understand system-level security requirements for enterprise networks and web services

Other editions

Similar books

  • Cybersecurity Essentials
    By Charles J. Brooks, Christopher Grow, Philip Craig

    This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios.

  • Cyber Security Essentials
    By James Graham, Rick Howard, Ryan Olson

    Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish

  • Cybersecurity Program Development for Business: The Essential Planning Guide
    By Chris Moschovitis

    Encyclopedia: A Chronology, 1843 to the Present, Christos J.P. Moschovitis, Hilary Poole, Erica Pearson, Tami Schuyler, Theresa Senft. ABC‐CLIO 2005. CHAPTER 3 A Cybersecurity Primer This chapter is your core.

  • Cybersecurity: Getting it Right : Hearing of the Subcommittee on Cybersecurity, Science, and Research and Development Before the Select Committee...
    By Science, United States. Congress. House. Select Committee on Homeland Security. Subcommittee on Cybersecurity, and Research and Development

    Cybersecurity: Getting it Right : Hearing of the Subcommittee on Cybersecurity, Science, and Research and Development Before the Select Committee...

  • At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues
    By National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board

    In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to ...

  • Cybersecurity in Digital Transformation: Scope and Applications
    By Dietmar P.F. Möller

    J. Robertson, A. Diab, E. Martin, E. Nunes, V. Paliath, J. Shakarian, P. Skakarian, Darkweb Cyber Threat Intelligence Mining (Cambridge University Press, Cambridge, 2017) 7. R. Borum, J. Felker, S. Kern, K. Demnesen, T. Feyes, ...

  • Cyber Security: Power and Technology
    By Pekka Neittaanmäki, Martti Lehto

    This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts.

  • Cybersecurity: The Essential Body Of Knowledge
    By Wm. Arthur Conklin, Dan Shoemaker

    This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization.

  • Adaptive Autonomous Secure Cyber Systems
    By Michael Wellman, V.S. Subrahmanian, Sushil Jajodia

    ... OSSEC host-based intrusion detection guide. Syngress, 2008. Leonardo De Moura and Nikolaj Bjørner. Z3: An efficient smt solver. In Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms ...

  • Computer Security: Art and Science
    By Matt Bishop, Matthew A. Bishop

    "This is an excellent text that should be read by every computer security professional and student." Dick Kemmerer, University of California, Santa Barbara.