Cybersecurity and Applied Mathematics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cybersecurity and Applied Mathematics by Leigh Metcalf, William Casey, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leigh Metcalf, William Casey ISBN: 9780128044995
Publisher: Elsevier Science Publication: June 7, 2016
Imprint: Syngress Language: English
Author: Leigh Metcalf, William Casey
ISBN: 9780128044995
Publisher: Elsevier Science
Publication: June 7, 2016
Imprint: Syngress
Language: English

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

  • Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
  • Contains numerous cybersecurity examples and exercises using real world data
  • Written by mathematicians and statisticians with hands-on practitioner experience
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

More books from Elsevier Science

Cover of the book Practical Chemical Thermodynamics for Geoscientists by Leigh Metcalf, William Casey
Cover of the book Modern Applications of Plant Biotechnology in Pharmaceutical Sciences by Leigh Metcalf, William Casey
Cover of the book Advanced Thermodynamics for Engineers by Leigh Metcalf, William Casey
Cover of the book Mesenchymal Stromal Cells by Leigh Metcalf, William Casey
Cover of the book Particles at Fluid Interfaces and Membranes by Leigh Metcalf, William Casey
Cover of the book Introduction to Criminalistics by Leigh Metcalf, William Casey
Cover of the book Advances in Ceramic Biomaterials by Leigh Metcalf, William Casey
Cover of the book Mechanisms of Memory by Leigh Metcalf, William Casey
Cover of the book Design and Optimization of Metal Structures by Leigh Metcalf, William Casey
Cover of the book Parasitic Protozoa by Leigh Metcalf, William Casey
Cover of the book Innovations in Adolescent Substance Abuse Interventions by Leigh Metcalf, William Casey
Cover of the book Computational Methods for Fracture in Porous Media by Leigh Metcalf, William Casey
Cover of the book Methods of Enzymatic Analysis V2 by Leigh Metcalf, William Casey
Cover of the book Progress in Filtration and Separation by Leigh Metcalf, William Casey
Cover of the book Citrix XenDesktop Implementation by Leigh Metcalf, William Casey
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy