Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Research techniques for computer sci...
~
Mbanaso, Uche M.
Linked to FindBook
Google Book
Amazon
博客來
Research techniques for computer science, information systems and cybersecurity
Record Type:
Electronic resources : Monograph/item
Title/Author:
Research techniques for computer science, information systems and cybersecurity/ by Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor.
Author:
Mbanaso, Uche M.
other author:
Abrahams, Lucienne.
Published:
Cham :Springer Nature Switzerland : : 2023.,
Description:
1 online resource (xxxv, 161 p.) :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Chapter 1- 21st Century Postgraduate Research -- Chapter 2- Computer Science (CS), Information Systems (IS), and Cybersecurity (CY) Research -- Chapter 3- Designing the Research Proposal, or Interim Report -- Chapter 4-Adopting a Funnel Strategy and Using Mind Mapping to Visualise the Research Design -- Chapter 5- Foundational Research Writing, Background Discussion and Literature Review -- Chapter 6- Research Philosophy, Design and Methodology -- Chapter 7- Data Collection, Presentation and Analysis -- Chapter 8- Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis.
Contained By:
Springer Nature eBook
Subject:
Computer science - Research. -
Online resource:
https://doi.org/10.1007/978-3-031-30031-8
ISBN:
9783031300318
Research techniques for computer science, information systems and cybersecurity
Mbanaso, Uche M.
Research techniques for computer science, information systems and cybersecurity
[electronic resource] /by Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor. - Cham :Springer Nature Switzerland :2023. - 1 online resource (xxxv, 161 p.) :ill. (some col.), digital ;24 cm.
Chapter 1- 21st Century Postgraduate Research -- Chapter 2- Computer Science (CS), Information Systems (IS), and Cybersecurity (CY) Research -- Chapter 3- Designing the Research Proposal, or Interim Report -- Chapter 4-Adopting a Funnel Strategy and Using Mind Mapping to Visualise the Research Design -- Chapter 5- Foundational Research Writing, Background Discussion and Literature Review -- Chapter 6- Research Philosophy, Design and Methodology -- Chapter 7- Data Collection, Presentation and Analysis -- Chapter 8- Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis.
This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative, qualitative, and mixed methods research enquiries. The content offers important perspectives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines. Provides a roadmap for CS, information systems and cybersecurity grappling with framing research topics Presents a path for embarking on research projects by reducing complexities to understanding the topics' relevant needs Distinguishes computer science, information systems and cybersecurity research while highlighting their intersection in a practical way.
ISBN: 9783031300318
Standard No.: 10.1007/978-3-031-30031-8doiSubjects--Topical Terms:
609959
Computer science
--Research.
LC Class. No.: QA76.27
Dewey Class. No.: 004.072
Research techniques for computer science, information systems and cybersecurity
LDR
:03232nmm a2200325 a 4500
001
2318752
003
DE-He213
005
20230525120125.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031300318
$q
(electronic bk.)
020
$a
9783031300301
$q
(paper)
024
7
$a
10.1007/978-3-031-30031-8
$2
doi
035
$a
978-3-031-30031-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.27
072
7
$a
TBD
$2
bicssc
072
7
$a
TEC016020
$2
bisacsh
072
7
$a
TBD
$2
thema
082
0 4
$a
004.072
$2
23
090
$a
QA76.27
$b
.M478 2023
100
1
$a
Mbanaso, Uche M.
$3
3634035
245
1 0
$a
Research techniques for computer science, information systems and cybersecurity
$h
[electronic resource] /
$c
by Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
1 online resource (xxxv, 161 p.) :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Chapter 1- 21st Century Postgraduate Research -- Chapter 2- Computer Science (CS), Information Systems (IS), and Cybersecurity (CY) Research -- Chapter 3- Designing the Research Proposal, or Interim Report -- Chapter 4-Adopting a Funnel Strategy and Using Mind Mapping to Visualise the Research Design -- Chapter 5- Foundational Research Writing, Background Discussion and Literature Review -- Chapter 6- Research Philosophy, Design and Methodology -- Chapter 7- Data Collection, Presentation and Analysis -- Chapter 8- Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis.
520
$a
This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative, qualitative, and mixed methods research enquiries. The content offers important perspectives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines. Provides a roadmap for CS, information systems and cybersecurity grappling with framing research topics Presents a path for embarking on research projects by reducing complexities to understanding the topics' relevant needs Distinguishes computer science, information systems and cybersecurity research while highlighting their intersection in a practical way.
650
0
$a
Computer science
$x
Research.
$3
609959
650
0
$a
Computer security
$x
Research.
$3
2002527
650
1 4
$a
Engineering Design.
$3
891033
650
2 4
$a
Operations Research and Decision Theory.
$3
3591727
650
2 4
$a
Research Skills.
$3
3332163
650
2 4
$a
Innovation and Technology Management.
$3
3538485
700
1
$a
Abrahams, Lucienne.
$3
3634036
700
1
$a
Okafor, K. C.
$3
3634037
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-30031-8
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9455002
電子資源
11.線上閱覽_V
電子書
EB QA76.27
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login