語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Research techniques for computer sci...
~
Mbanaso, Uche M.
FindBook
Google Book
Amazon
博客來
Research techniques for computer science, information systems and cybersecurity
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Research techniques for computer science, information systems and cybersecurity/ by Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor.
作者:
Mbanaso, Uche M.
其他作者:
Abrahams, Lucienne.
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
1 online resource (xxxv, 161 p.) :ill. (some col.), digital ;24 cm.
內容註:
Chapter 1- 21st Century Postgraduate Research -- Chapter 2- Computer Science (CS), Information Systems (IS), and Cybersecurity (CY) Research -- Chapter 3- Designing the Research Proposal, or Interim Report -- Chapter 4-Adopting a Funnel Strategy and Using Mind Mapping to Visualise the Research Design -- Chapter 5- Foundational Research Writing, Background Discussion and Literature Review -- Chapter 6- Research Philosophy, Design and Methodology -- Chapter 7- Data Collection, Presentation and Analysis -- Chapter 8- Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis.
Contained By:
Springer Nature eBook
標題:
Computer science - Research. -
電子資源:
https://doi.org/10.1007/978-3-031-30031-8
ISBN:
9783031300318
Research techniques for computer science, information systems and cybersecurity
Mbanaso, Uche M.
Research techniques for computer science, information systems and cybersecurity
[electronic resource] /by Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor. - Cham :Springer Nature Switzerland :2023. - 1 online resource (xxxv, 161 p.) :ill. (some col.), digital ;24 cm.
Chapter 1- 21st Century Postgraduate Research -- Chapter 2- Computer Science (CS), Information Systems (IS), and Cybersecurity (CY) Research -- Chapter 3- Designing the Research Proposal, or Interim Report -- Chapter 4-Adopting a Funnel Strategy and Using Mind Mapping to Visualise the Research Design -- Chapter 5- Foundational Research Writing, Background Discussion and Literature Review -- Chapter 6- Research Philosophy, Design and Methodology -- Chapter 7- Data Collection, Presentation and Analysis -- Chapter 8- Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis.
This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative, qualitative, and mixed methods research enquiries. The content offers important perspectives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines. Provides a roadmap for CS, information systems and cybersecurity grappling with framing research topics Presents a path for embarking on research projects by reducing complexities to understanding the topics' relevant needs Distinguishes computer science, information systems and cybersecurity research while highlighting their intersection in a practical way.
ISBN: 9783031300318
Standard No.: 10.1007/978-3-031-30031-8doiSubjects--Topical Terms:
609959
Computer science
--Research.
LC Class. No.: QA76.27
Dewey Class. No.: 004.072
Research techniques for computer science, information systems and cybersecurity
LDR
:03232nmm a2200325 a 4500
001
2318752
003
DE-He213
005
20230525120125.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031300318
$q
(electronic bk.)
020
$a
9783031300301
$q
(paper)
024
7
$a
10.1007/978-3-031-30031-8
$2
doi
035
$a
978-3-031-30031-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.27
072
7
$a
TBD
$2
bicssc
072
7
$a
TEC016020
$2
bisacsh
072
7
$a
TBD
$2
thema
082
0 4
$a
004.072
$2
23
090
$a
QA76.27
$b
.M478 2023
100
1
$a
Mbanaso, Uche M.
$3
3634035
245
1 0
$a
Research techniques for computer science, information systems and cybersecurity
$h
[electronic resource] /
$c
by Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
1 online resource (xxxv, 161 p.) :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Chapter 1- 21st Century Postgraduate Research -- Chapter 2- Computer Science (CS), Information Systems (IS), and Cybersecurity (CY) Research -- Chapter 3- Designing the Research Proposal, or Interim Report -- Chapter 4-Adopting a Funnel Strategy and Using Mind Mapping to Visualise the Research Design -- Chapter 5- Foundational Research Writing, Background Discussion and Literature Review -- Chapter 6- Research Philosophy, Design and Methodology -- Chapter 7- Data Collection, Presentation and Analysis -- Chapter 8- Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis.
520
$a
This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative, qualitative, and mixed methods research enquiries. The content offers important perspectives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines. Provides a roadmap for CS, information systems and cybersecurity grappling with framing research topics Presents a path for embarking on research projects by reducing complexities to understanding the topics' relevant needs Distinguishes computer science, information systems and cybersecurity research while highlighting their intersection in a practical way.
650
0
$a
Computer science
$x
Research.
$3
609959
650
0
$a
Computer security
$x
Research.
$3
2002527
650
1 4
$a
Engineering Design.
$3
891033
650
2 4
$a
Operations Research and Decision Theory.
$3
3591727
650
2 4
$a
Research Skills.
$3
3332163
650
2 4
$a
Innovation and Technology Management.
$3
3538485
700
1
$a
Abrahams, Lucienne.
$3
3634036
700
1
$a
Okafor, K. C.
$3
3634037
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-3-031-30031-8
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9455002
電子資源
11.線上閱覽_V
電子書
EB QA76.27
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入