"A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and implement ready-to-use security tools. Features code examples in Python and hands-on proof-of-concept projects for solving real-world problems"--
"A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and implement ready-to-use security tools. Features code examples in Python and hands-on proof-of-concept projects for solving real-world problems"--Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Daniel Reilly is a security researcher, analyst, and consultant based out of Seattle, WA. He has worked in the security field for 20 years, more than half of which has been spent developing and managing operational security for small businesses.
Inhaltsangabe
Acknowledgments Introduction PART I: ENVIRONMENT AND CONVENTIONS Chapter 1: Setting up the Environment Chapter 2: Programming and Math Conventions PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRY Chapter 3: Securing Networks with Graph Theory Chapter 4: Building a Network Traffic Analysis Tool Chapter 5: Identifying Threats with Social Network Analysis Chapter 6: Analyzing Social Networks to Prevent Security Incidents Chapter 7: Using Geometry to Improve Security Practices Chapter 8: Tracking People in Physical Space with Digital Information Chapter 9: Computational Geometry for Safety Resource Distribution Chapter 10: Computational Geometry for Facial Recognition PART III: THE ART GALLERY PROBLEM Chapter 11: Distributing Security Resources to Guard a Space Chapter 12: The Minimum Viable Product Approach to Security Software Development Chapter 13: Delivering Python Applications Notes Index
Acknowledgments Introduction PART I: ENVIRONMENT AND CONVENTIONS Chapter 1: Setting up the Environment Chapter 2: Programming and Math Conventions PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRY Chapter 3: Securing Networks with Graph Theory Chapter 4: Building a Network Traffic Analysis Tool Chapter 5: Identifying Threats with Social Network Analysis Chapter 6: Analyzing Social Networks to Prevent Security Incidents Chapter 7: Using Geometry to Improve Security Practices Chapter 8: Tracking People in Physical Space with Digital Information Chapter 9: Computational Geometry for Safety Resource Distribution Chapter 10: Computational Geometry for Facial Recognition PART III: THE ART GALLERY PROBLEM Chapter 11: Distributing Security Resources to Guard a Space Chapter 12: The Minimum Viable Product Approach to Security Software Development Chapter 13: Delivering Python Applications Notes Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497