Cybersecurity and Applied Mathematics

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

  • Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
  • Contains numerous cybersecurity examples and exercises using real world data
  • Written by mathematicians and statisticians with hands-on practitioner experience
"1133478893"
Cybersecurity and Applied Mathematics

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

  • Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
  • Contains numerous cybersecurity examples and exercises using real world data
  • Written by mathematicians and statisticians with hands-on practitioner experience
52.49 In Stock
Cybersecurity and Applied Mathematics

Cybersecurity and Applied Mathematics

Cybersecurity and Applied Mathematics

Cybersecurity and Applied Mathematics

eBook

$52.49  $69.95 Save 25% Current price is $52.49, Original price is $69.95. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

  • Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
  • Contains numerous cybersecurity examples and exercises using real world data
  • Written by mathematicians and statisticians with hands-on practitioner experience

Product Details

ISBN-13: 9780128044995
Publisher: Elsevier Science
Publication date: 06/07/2016
Sold by: Barnes & Noble
Format: eBook
Pages: 240
File size: 6 MB

About the Author

Leigh Metcalf research’s network security, game theory, formal languages, and dynamical systems. She is Editor in Chief of the Journal on Digital Threats and has a PhD in Mathematics.
Will Casey works in threat analysis, code analysis, natural language processing, genomics, bioinformatics, and applied mathematics. He has a MS and MA in Mathematics and a PhD in Applied Mathematics.

Table of Contents

Ch. 1: Collecting and Reasoning about Cybersecurity Data

Ch. 2: Exploratory Data Analysis

Ch. 3: Measures, Differences and Similarities

Ch. 4: Graph Theory

Ch. 5: Topological Data Analysis

Ch. 6: Visualization

Ch. 7: Cyber Stringology

Ch. 8: Probability and Probability Models

Ch. 9: Hierarchical Models

What People are Saying About This

From the Publisher

Explores the mathematical concepts of effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field

From the B&N Reads Blog

Customer Reviews