Booktopia has been placed into Voluntary Administration. Orders have been temporarily suspended, whilst the process for the recapitalisation of Booktopia and/or sale of its business is completed, following which services may be re-established. All enquiries from creditors, including customers with outstanding gift cards and orders and placed prior to 3 July 2024, please visit https://www.mcgrathnicol.com/creditors/booktopia-group/
Add free shipping to your order with these great books
Math for Security : From Graphs and Geometry to Spatial Analysis - Daniel Reilly

Math for Security

From Graphs and Geometry to Spatial Analysis

By: Daniel Reilly

eBook | 24 October 2023

At a Glance

eBook


RRP $58.67

$46.99

20%OFF

or 4 interest-free payments of $11.75 with

Instant Digital Delivery to your Booktopia Reader App

Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book.

Explore the intersection of mathematics and computer security with this engaging and accessible guide.

Math for Security will equip you with essential tools to tackle complex security problems head on. All you need are some basic programming skills. Once you've set up your development environment and reviewed the necessary Python syntax and math notation in the early chapters, you'll dive deep into practical applications, leveraging the power of math to analyze networks, optimize resource distribution, and much more. In the book's final chapters, you'll take your projects from proof of concepts to viable applications and explore options for delivering them to end users.

As you work through various security scenarios, you'll:

  • Employ packet analysis and graph theory to detect data exfiltration attempts in a network
  • Predict potential targets and find weaknesses in social networks with Monte Carlo simulations
  • Use basic geometry and OpenCell data to triangulate a phone's location without GPS
  • Apply computational geometry to Voronoi diagrams for use in emergency service planning
  • Train a facial recognition system with machine learning for real-time identity verification
  • Use spatial analysis to distribute physical security features effectively in an art gallery

Whether you're an aspiring security professional, a social network analyst, or an innovator seeking to create cutting-edge security solutions, this book will empower you to solve complex problems with precision and confidence. Embrace the intricate world of math as your secret weapon in computer security!

Covers Python 3.x

on

More in Data Encryption

Android Malware Detection and Adversarial Methods - Weina Niu

eBOOK