
- 240 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cybersecurity and Applied Mathematics
About this book
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.- Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand- Contains numerous cybersecurity examples and exercises using real world data- Written by mathematicians and statisticians with hands-on practitioner experience
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Introduction
Abstract
Keywords
Metrics, similarity, and sets
Abstract
Keywords
2.1 Introduction to Set Theory
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Biography
- Chapter 1: Introduction
- Chapter 2: Metrics, similarity, and sets
- Chapter 3: Probability models
- Chapter 4: Introduction to data analysis
- Chapter 5: Graph theory
- Chapter 6: Game theory
- Chapter 7: Visualizing cybersecurity data
- Chapter 8: String analysis for cyber strings
- Chapter 9: Persistent homology
- Appendix: Introduction to linear algebra
- Bibliography
- Index