Book description
Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.
Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.
- Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
- Contains numerous cybersecurity examples and exercises using real world data
- Written by mathematicians and statisticians with hands-on practitioner experience
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Biography
- Chapter 1: Introduction
-
Chapter 2: Metrics, similarity, and sets
- Abstract
- 2.1 Introduction to Set Theory
- 2.2 Operations on Sets
- 2.3 Set Theory Laws
- 2.4 Functions
- 2.5 Metrics
- 2.6 Distance Variations
- 2.7 Similarities
- 2.8 Metrics and Similarities of Numbers
- 2.9 Metrics and Similarities of Strings
- 2.10 Metrics and Similarities of Sets of Sets
- 2.11 Mahalanobis Distance
- 2.12 Internet Metrics
- Chapter 3: Probability models
-
Chapter 4: Introduction to data analysis
- Abstract
- 4.1 The Language of Data Analysis
- 4.2 Units, Variables, and Repeated Measures
- 4.3 Distributions of Data
- 4.4 Visualizing Distributions
- 4.5 Data Outliers
- 4.6 Log Transformation
- 4.7 Parametric Families
- 4.8 Bivariate Analysis
- 4.9 Time Series
- 4.10 Classification
- 4.11 Generating Hypotheses
- 4.12 Conclusion
-
Chapter 5: Graph theory
- Abstract
- 5.1 An Introduction to Graph Theory
- 5.2 Varieties of Graphs
- 5.3 Properties of Graphs
- 5.4 Paths, Cycles and Trees
- 5.5 Varieties of Graphs Revisited
- 5.6 Representing Graphs
- 5.7 Triangles, the Smallest Cycle
- 5.8 Distances on Graphs
- 5.9 More properties of graphs
- 5.10 Centrality
- 5.11 Covering
- 5.12 Creating New Graphs from Old
- 5.13 Conclusion
- Chapter 6: Game theory
- Chapter 7: Visualizing cybersecurity data
- Chapter 8: String analysis for cyber strings
- Chapter 9: Persistent homology
- Appendix: Introduction to linear algebra
- Bibliography
- Index
Product information
- Title: Cybersecurity and Applied Mathematics
- Author(s):
- Release date: June 2016
- Publisher(s): Syngress
- ISBN: 9780128044995
You might also like
book
Modern Cryptography: Applied Mathematics for Encryption and Information Security
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all …
book
Python for Cybersecurity
Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for …
book
Serious Cryptography
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of …
book
Real-World Cryptography
An all-practical guide to the cryptography behind common tools and protocols that will help you make …