Applied Math for Security: A Pythonic Introduction to Graph Theory and Computational Geometry

Applied Math for Security: A Pythonic Introduction to Graph Theory and Computational Geometry
Use applied math to map fire stations, develop facial recognition software, protect an art gallery and more in this hands-on, real-world infosec book. Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to use concepts from various fields of mathematics--like graph theory, computational geometry, and statistics--to create and implement ready-to-use security tools. The book is written in a lively, conversational style that engages readers from the get-go. Chapters are enriched with code examples written in Python, and feature hands-on "proof of concept" projects that involve developing math-based applications to solve real-world problems. Readers are also able to apply the mathematical constructs that they learn to a variety of challenging scenarios, like determining the ideal location for fire stations, disrupting information flow in a social network, building facial recognition software, and designing custom tools for modern security work.
Descrierea produsului
Use applied math to map fire stations, develop facial recognition software, protect an art gallery and more in this hands-on, real-world infosec book. Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to use concepts from various fields of mathematics--like graph theory, computational geometry, and statistics--to create and implement ready-to-use security tools. The book is written in a lively, conversational style that engages readers from the get-go. Chapters are enriched with code examples written in Python, and feature hands-on "proof of concept" projects that involve developing math-based applications to solve real-world problems. Readers are also able to apply the mathematical constructs that they learn to a variety of challenging scenarios, like determining the ideal location for fire stations, disrupting information flow in a social network, building facial recognition software, and designing custom tools for modern security work.
Detaliile produsului