Cybersecurity and Applied Mathematics

Author:   Leigh Metcalf (PhD (Mathematics), Co-Editor in Chief, ACM Digital Threats) ,  William Casey (PhD (Applied Mathematics))
Publisher:   Syngress Media,U.S.
ISBN:  

9780128044520


Pages:   240
Publication Date:   07 June 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $184.67 Quantity:  
Add to Cart

Share |

Cybersecurity and Applied Mathematics


Add your own review!

Overview

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

Full Product Details

Author:   Leigh Metcalf (PhD (Mathematics), Co-Editor in Chief, ACM Digital Threats) ,  William Casey (PhD (Applied Mathematics))
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Dimensions:   Width: 19.10cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.430kg
ISBN:  

9780128044520


ISBN 10:   0128044527
Pages:   240
Publication Date:   07 June 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Ch. 1: Collecting and Reasoning about Cybersecurity Data Ch. 2: Exploratory Data Analysis Ch. 3: Measures, Differences and Similarities Ch. 4: Graph Theory Ch. 5: Topological Data Analysis Ch. 6: Visualization Ch. 7: Cyber Stringology Ch. 8: Probability and Probability Models Ch. 9: Hierarchical Models

Reviews

Author Information

Leigh Metcalf research’s network security, game theory, formal languages, and dynamical systems. She is Editor in Chief of the Journal on Digital Threats and has a PhD in Mathematics. Will Casey works in threat analysis, code analysis, natural language processing, genomics, bioinformatics, and applied mathematics. He has a MS and MA in Mathematics and a PhD in Applied Mathematics.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List