Cargando…

Cybersecurity and applied mathematics /

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Metcalf, Leigh (Autor), Casey, William (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress is an imprint of Elsevier, [2016]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn953359405
003 OCoLC
005 20231120112121.0
006 m o d
007 cr |n|||||||||
008 160614t20162016maua ob 001 0 eng d
040 |a CNCGM  |b eng  |e rda  |e pn  |c CNCGM  |d OCLCO  |d OPELS  |d TEFOD  |d N$T  |d UIU  |d YDX  |d ISM  |d U3W  |d OCLCA  |d D6H  |d OCLCQ  |d AU@  |d UKMGB  |d UMI  |d S2H  |d OCLCO  |d TOH  |d LUN  |d UX1  |d OCLCO  |d OCLCQ 
015 |a GBB684811  |2 bnb 
015 |a GBB683617  |2 bnb 
016 7 |a 017889115  |2 Uk 
016 7 |a 017887920  |2 Uk 
019 |a 957635860  |a 959423830  |a 1162431472  |a 1200511463  |a 1224589901  |a 1233042827  |a 1235118279 
020 |a 9780128044995  |q (electronic bk.) 
020 |a 0128044993  |q (electronic bk.) 
020 |z 9780128044520  |q (pbk.) 
020 |z 0128044527  |q (pbk.) 
024 8 |a C2015001807X 
024 8 |a 9780128044995 
035 |a (OCoLC)953359405  |z (OCoLC)957635860  |z (OCoLC)959423830  |z (OCoLC)1162431472  |z (OCoLC)1200511463  |z (OCoLC)1224589901  |z (OCoLC)1233042827  |z (OCoLC)1235118279 
050 4 |a QA76.9.A25  |b M48 2016eb 
072 7 |a COM  |x 031000  |2 bisacsh 
082 0 4 |a 005.820151  |2 23 
100 1 |a Metcalf, Leigh,  |e author. 
245 1 0 |a Cybersecurity and applied mathematics /  |c Leigh Metcalf, William Casey. 
264 1 |a Cambridge, MA :  |b Syngress is an imprint of Elsevier,  |c [2016] 
264 4 |c �2016 
300 |a 1 online resource (xi, 188 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references (pages 179-182) and index. 
588 0 |a Print version record. 
505 0 |a Machine generated contents note: 2.1. Introduction to Set Theory -- 2.2. Operations on Sets -- 2.2.1.Complement -- 2.2.2. Intersection -- 2.2.3. Union -- 2.2.4. Difference -- 2.2.5. Symmetric Difference -- 2.2.6. Cross Product -- 2.3. Set Theory Laws -- 2.4. Functions -- 2.5. Metrics -- 2.6. Distance Variations -- 2.6.1. Pseudometric -- 2.6.2. Quasimetric -- 2.6.3. Semimetric -- 2.7. Similarities -- 2.8. Metrics and Similarities of Numbers -- 2.8.1. Lp Metrics -- 2.8.2. Gaussian Kernel -- 2.9. Metrics and Similarities of Strings -- 2.9.1. Levenshtein Distance -- 2.9.2. Hamming Distance -- 2.10. Metrics and Similarities of Sets of Sets -- 2.10.1. Jaccard Index -- 2.10.2. Tanimoto Distance -- 2.10.3. Overlap Coefficient -- 2.10.4. Hausdorff Metric -- 2.10.5. Kendall's Tau -- 2.11. Mahalanobis Distance -- 2.12. Internet Metrics -- 2.12.1. Great Circle Distance -- 2.12.2. Hop Distance -- 2.12.3. Keyword Distance -- 3.1. Basic Probability Review -- 3.1.1. Language and Axioms of Probability 
505 0 |a Note continued: 3.1.2.Combinatorics Aka Parlor Tricks -- 3.1.3. Joint and Conditional Probability -- 3.1.4. Independence and Bayes Rule -- 3.2. From Parlor Tricks to Random Variables -- 3.2.1. Types of Random Variables -- 3.2.2. Properties of Random Variables -- 3.3. The Random Variable as a Model -- 3.3.1. Bernoulli and Geometric Distributions -- 3.3.2. Binomial Distribution -- 3.3.3. Poisson Distribution -- 3.3.4. Normal Distribution -- 3.3.5. Pareto Distributions -- 3.3.6. Uniform Distribution -- 3.4. Multiple Random Variables -- 3.5. Using Probability and Random Distributions -- 3.6. Conclusion -- 4.1. The Language of Data Analysis -- 4.1.1. Producing Data -- 4.1.2. Exploratory Data Analysis -- 4.1.3. Inference -- 4.2. Units, Variables, and Repeated Measures -- 4.2.1. Measurement Error and Random Variation -- 4.3. Distributions of Data -- 4.4. Visualizing Distributions -- 4.4.1. Bar Plot -- 4.4.2. Histogram -- 4.4.3. Box Plots -- 4.4.4. Density Plot -- 4.5. Data Outliers 
505 0 |a Note continued: 4.6. Log Transformation -- 4.7. Parametric Families -- 4.8. Bivariate Analysis -- 4.8.1. Visualizing Bipartite Variables -- 4.8.2. Correlation -- 4.9. Time Series -- 4.10. Classification -- 4.11. Generating Hypotheses -- 4.12. Conclusion -- 5.1. An Introduction to Graph Theory -- 5.2. Varieties of Graphs -- 5.2.1. Undirected Graph -- 5.2.2. Directed Graph -- 5.2.3. Multigraph -- 5.2.4. Bipartite Graph -- 5.2.5. Subgraph -- 5.2.6. Graph Complement -- 5.3. Properties of Graphs -- 5.3.1. Graph Sizes -- 5.3.2. Vertices and Their Edges -- 5.3.3. Degree -- 5.3.4. Directed Graphs and Degrees -- 5.3.5. Scale Free Graphs -- 5.4. Paths, Cycles and Trees -- 5.4.1. Paths and Cycles -- 5.4.2. Shortest Paths -- 5.4.3. Connected and Disconnected Graphs -- 5.4.4. Trees -- 5.4.5. Cycles and Their Properties -- 5.4.6. Spanning Trees -- 5.5. Varieties of Graphs Revisited -- 5.5.1. Graph Density, Sparse and Dense Graphs -- 5.5.2.Complete and Regular Graphs -- 5.5.3. Weighted Graph 
505 0 |a Note continued: 5.5.4. And Yet More Graphs! -- 5.6. Representing Graphs -- 5.6.1. Adjacency Matrix -- 5.6.2. Incidence Matrix -- 5.7. Triangles, the Smallest Cycle -- 5.7.1. Introduction and Counting -- 5.7.2. Triangle Free Graphs -- 5.7.3. The Local Clustering Coefficient -- 5.8. Distances on Graphs -- 5.8.1. Eccentricity -- 5.8.2. Cycle Length Properties -- 5.9. More Properties of Graphs -- 5.9.1. Cut -- 5.9.2. Bridge -- 5.9.3. Partitions -- 5.9.4. Vertex Separators -- 5.9.5. Cliques -- 5.10. Centrality -- 5.10.1. Betweenness -- 5.10.2. Degree Centrality -- 5.10.3. Closeness and Farness -- 5.10.4. Cross-Clique Centrality -- 5.11. Covering -- 5.11.1. Vertex Covering -- 5.11.2. Edge Cover -- 5.12. Creating New Graphs from Old -- 5.12.1. Union Graphs -- 5.12.2. Intersection Graphs -- 5.12.3. Uniting Graphs -- 5.12.4. The Intersection Graph -- 5.12.5. Modifying Existing Graphs -- 5.13. Conclusion -- 6.1. The Prisoner's Dilemma -- 6.2. The Mathematical Definition of a Game 
505 0 |a Note continued: 6.2.1. Strategies, Payoffs and Normal Form -- 6.2.2. Normal Form -- 6.2.3. Extensive Form -- 6.3. Snowdrift Game -- 6.4. Stag Hunt Game -- 6.5. Iterative Prisoner's Dilemma -- 6.6. Game Solutions -- 6.6.1. Cooperative and Non-Cooperative Games -- 6.6.2. Zero Sum Game -- 6.6.3. Dominant Strategy -- 6.6.4. Nash Equilibrium -- 6.6.5. Mixed Strategy Nash Equilibrium -- 6.7. Partially Informed Games -- 6.8. Leader-Follower Game -- 6.8.1. Stackelberg Game -- 6.8.2. Colonel Blotto -- 6.9. Signaling Games -- 7.1. Why Visualize? -- 7.2. What We Visualize -- 7.2.1. Considering the Efficacy of a Visualization -- 7.2.2. Data Collection and Visualization -- 7.2.3. Visualizing Malware Features -- 7.2.4. Existence Plots -- 7.2.5.Combining Plots -- 7.3. Visualizing IP Addresses -- 7.3.1. Hilbert Curve -- 7.3.2. Heat Map -- 7.4. Plotting Higher Dimensional Data -- 7.4.1. Principal Component Analysis -- 7.4.2. Sammon Mapping -- 7.5. Graph Plotting -- 7.6. Visualizing Malware 
520 |a Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data. Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand Contains numerous cybersecurity examples and exercises using real world data Written by mathematicians and statisticians with hands-on practitioner experience. 
542 |f Copyright and#169: Elsevier Science and Technology  |g 2016 
650 0 |a Computer security  |x Mathematics. 
650 6 |a S�ecurit�e informatique  |0 (CaQQLa)201-0061152  |x Math�ematiques.  |0 (CaQQLa)201-0380112 
650 7 |a MATHEMATICS  |x Discrete Mathematics.  |2 bisacsh 
700 1 |a Casey, William,  |e author. 
776 0 8 |i Print version :  |z 9780128044520 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128044520  |z Texto completo