9 Computational Geometry for Safety Resource Distribution

In enterprise security work, you’ll often be asked to assist with a wide variety of infrastructure planning and deployment tasks that have more to do with providing safety than the traditional CIA (confidentiality, integrity, availability) triad we commonly think of as guiding information security. But fear not—with the mathematical tools you’re collecting, you’ll be able to adapt to the changing challenges and thrive under them. In this chapter we’ll focus on one of the most commonly applied tools from computational geometry, and one of my personal favorite algorithms: Voronoi tessellation. ...

Get Math for Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.