Cybersecurity and Applied Mathematics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cybersecurity and Applied Mathematics by Leigh Metcalf, William Casey, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Leigh Metcalf, William Casey ISBN: 9780128044995
Publisher: Elsevier Science Publication: June 7, 2016
Imprint: Syngress Language: English
Author: Leigh Metcalf, William Casey
ISBN: 9780128044995
Publisher: Elsevier Science
Publication: June 7, 2016
Imprint: Syngress
Language: English

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

  • Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
  • Contains numerous cybersecurity examples and exercises using real world data
  • Written by mathematicians and statisticians with hands-on practitioner experience
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

More books from Elsevier Science

Cover of the book Yunnan-A Chinese Bridgehead to Asia by Leigh Metcalf, William Casey
Cover of the book Seismic Safety of High Arch Dams by Leigh Metcalf, William Casey
Cover of the book Fluvial-Tidal Sedimentology by Leigh Metcalf, William Casey
Cover of the book Chemistry by Leigh Metcalf, William Casey
Cover of the book Biomaterials in Plastic Surgery by Leigh Metcalf, William Casey
Cover of the book Immobilized Cells: Basics and Applications by Leigh Metcalf, William Casey
Cover of the book Next Generation Data Centers in Financial Services by Leigh Metcalf, William Casey
Cover of the book Principles of Behavioral Genetics by Leigh Metcalf, William Casey
Cover of the book RNA Turnover in Eukaryotes: Analysis of Specialized and Quality Control RNA Decay Pathways by Leigh Metcalf, William Casey
Cover of the book Metabolic Phenotyping in Personalized and Public Healthcare by Leigh Metcalf, William Casey
Cover of the book Sputtering Materials for VLSI and Thin Film Devices by Leigh Metcalf, William Casey
Cover of the book The Immune Response by Leigh Metcalf, William Casey
Cover of the book Cartilage by Leigh Metcalf, William Casey
Cover of the book Drosophila Cells in Culture by Leigh Metcalf, William Casey
Cover of the book Cellular RNA Interference Mechanisms by Leigh Metcalf, William Casey
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy