Cybersecurity and Applied Mathematics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cybersecurity and Applied Mathematics by Leigh Metcalf, William Casey, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leigh Metcalf, William Casey ISBN: 9780128044995
Publisher: Elsevier Science Publication: June 7, 2016
Imprint: Syngress Language: English
Author: Leigh Metcalf, William Casey
ISBN: 9780128044995
Publisher: Elsevier Science
Publication: June 7, 2016
Imprint: Syngress
Language: English

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

  • Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
  • Contains numerous cybersecurity examples and exercises using real world data
  • Written by mathematicians and statisticians with hands-on practitioner experience
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

More books from Elsevier Science

Cover of the book Introduction to Cyber-Warfare by Leigh Metcalf, William Casey
Cover of the book Evaluating Environmental and Social Impact Assessment in Developing Countries by Leigh Metcalf, William Casey
Cover of the book The Designer's Guide to VHDL by Leigh Metcalf, William Casey
Cover of the book Thyroid Cancer and Nuclear Accidents by Leigh Metcalf, William Casey
Cover of the book TRP Channels as Therapeutic Targets by Leigh Metcalf, William Casey
Cover of the book Coronary Microvascular Obstruction in Acute Myocardial Infarction by Leigh Metcalf, William Casey
Cover of the book Reference Data for Engineers by Leigh Metcalf, William Casey
Cover of the book Modelling and Simulation of Integrated Systems in Engineering by Leigh Metcalf, William Casey
Cover of the book The Parathyroids by Leigh Metcalf, William Casey
Cover of the book The Mouse Nervous System by Leigh Metcalf, William Casey
Cover of the book A Course in Probability Theory by Leigh Metcalf, William Casey
Cover of the book Handbook of Non-Ferrous Metal Powders by Leigh Metcalf, William Casey
Cover of the book Climate Vulnerability by Leigh Metcalf, William Casey
Cover of the book Handbook of Silicon Based MEMS Materials and Technologies by Leigh Metcalf, William Casey
Cover of the book Engineering Design, Planning, and Management by Leigh Metcalf, William Casey
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy