Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.
Les mer
Ch. 1: Collecting and Reasoning about Cybersecurity Data Ch. 2: Exploratory Data Analysis Ch. 3: Measures, Differences and Similarities Ch. 4: Graph Theory Ch. 5: Topological Data Analysis Ch. 6: Visualization Ch. 7: Cyber Stringology Ch. 8: Probability and Probability Models Ch. 9: Hierarchical Models
Les mer
Explores the mathematical concepts of effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field
Explores the mathematical concepts of effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field
Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand Contains numerous cybersecurity examples and exercises using real world data Written by mathematicians and statisticians with hands-on practitioner experience
Les mer

Produktdetaljer

ISBN
9780128044520
Publisert
2016-06-07
Utgiver
Vendor
Syngress Media,U.S.
Vekt
430 gr
Høyde
235 mm
Bredde
191 mm
Aldersnivå
P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
240

Biographical note

Leigh Metcalf research’s network security, game theory, formal languages, and dynamical systems. She is Editor in Chief of the Journal on Digital Threats and has a PhD in Mathematics. Will Casey works in threat analysis, code analysis, natural language processing, genomics, bioinformatics, and applied mathematics. He has a MS and MA in Mathematics and a PhD in Applied Mathematics.