Cantitate/Preț
Produs

Cybersecurity and Applied Mathematics

Autor Leigh Metcalf, William Casey
en Limba Engleză Paperback – 6 iun 2016

"Cybersecurity and Applied Mathematics" explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.
Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at handContains numerous cybersecurity examples and exercises using real world dataWritten by mathematicians and statisticians with hands-on practitioner experience

Citește tot Restrânge

Preț: 30788 lei

Preț vechi: 42246 lei
-27% Nou

Puncte Express: 462

Preț estimativ în valută:
5893 6073$ 4975£

Carte tipărită la comandă

Livrare economică 24 februarie-10 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780128044520
ISBN-10: 0128044527
Pagini: 240
Dimensiuni: 191 x 235 x 15 mm
Greutate: 0.45 kg
Editura: ELSEVIER SCIENCE

Cuprins

Ch. 1: Collecting and Reasoning about Cybersecurity Data
Ch. 2: Exploratory Data Analysis
Ch. 3: Measures, Differences and Similarities
Ch. 4: Graph Theory
Ch. 5: Topological Data Analysis
Ch. 6: Visualization
Ch. 7: Cyber Stringology
Ch. 8: Probability and Probability Models
Ch. 9: Hierarchical Models

Descriere

"Cybersecurity and Applied Mathematics" explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.
Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at handContains numerous cybersecurity examples and exercises using real world dataWritten by mathematicians and statisticians with hands-on practitioner experience