<span>This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begi
Research Techniques for Computer Science, Information Systems and Cybersecurity
โ Scribed by Uche M. Mbanaso; Lucienne Abrahams; Kennedy Chinedu Okafor
- Publisher
- Springer Nature
- Year
- 2023
- Tongue
- English
- Leaves
- 187
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative, qualitative, and mixed methods research enquiries. The content offers important perspectives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.
๐ SIMILAR VOLUMES
<span>This book includes extended and revised versions of selected papers from the 11th and 12th editions of the International Conference on Operations Research and Enterprise Systems (ICORES 2022 and ICORES 2023). ICORES 2022 was held as a virtual event in February 2022, and ICORES 2023 was held in
Unlock the world of ethical hacking with "Ethical Hacking: Understanding the basics of Hacking Tools and Techniques for Cybersecurity and Safeguarding Information in computer systems and computer networks." This comprehensive guide takes you on a journey through the fundamentals of ethical hacking,
<span>This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from Februa
With everything readers need to know about how to execute their research project, this book is written specifically for information systems (IS) and computing students. It introduces key quantitative and qualitative research methods, makes sense of underlying philosophies, and helps readers navigate
With everything readers need to know about how to execute their research project, this book is written specifically for information systems (IS) and computing students. It introduces key quantitative and qualitative research methods, makes sense of underlying philosophies, and will help readers navi