LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitio… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.
Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.
Computer Security Architects, Engineers, Analysts, Software Developers, Incident Responders, System and Network Engineers, Penetration Testers, and Vulnerability Assessors. Advanced Undergraduate and Graduate students in Cybersecurity, Network Security, Information Technology, Computer Science, and Applied Mathematics
LM
WC