Cybersecurity and Applied Mathematics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cybersecurity and Applied Mathematics by Leigh Metcalf, William Casey, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leigh Metcalf, William Casey ISBN: 9780128044995
Publisher: Elsevier Science Publication: June 7, 2016
Imprint: Syngress Language: English
Author: Leigh Metcalf, William Casey
ISBN: 9780128044995
Publisher: Elsevier Science
Publication: June 7, 2016
Imprint: Syngress
Language: English

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

  • Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
  • Contains numerous cybersecurity examples and exercises using real world data
  • Written by mathematicians and statisticians with hands-on practitioner experience
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

More books from Elsevier Science

Cover of the book Carbonate Reservoirs: Porosity, Evolution and Diagenesis in a Sequence Stratigraphic Framework by Leigh Metcalf, William Casey
Cover of the book The Microbiological Quality of Food by Leigh Metcalf, William Casey
Cover of the book Handbook of Vertebrate Immunology by Leigh Metcalf, William Casey
Cover of the book Integrated Security Systems Design by Leigh Metcalf, William Casey
Cover of the book Stress and Epigenetics in Suicide by Leigh Metcalf, William Casey
Cover of the book Durum Wheat Chemistry and Technology by Leigh Metcalf, William Casey
Cover of the book Granular Filtration of Aerosols and Hydrosols by Leigh Metcalf, William Casey
Cover of the book What Went Wrong? by Leigh Metcalf, William Casey
Cover of the book Embedded Mechatronic Systems, Volume 1 by Leigh Metcalf, William Casey
Cover of the book Performance Management for the Oil, Gas, and Process Industries by Leigh Metcalf, William Casey
Cover of the book Practical Business Statistics by Leigh Metcalf, William Casey
Cover of the book Regulatory Mechanisms in Lymphocyte Activation by Leigh Metcalf, William Casey
Cover of the book Therapeutic Protein Drug Products by Leigh Metcalf, William Casey
Cover of the book Mathematical Physics in Theoretical Chemistry by Leigh Metcalf, William Casey
Cover of the book Personnel Protection: Aircraft Security by Leigh Metcalf, William Casey
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy