Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
39,25 €*
Versandkostenfrei per Post / DHL
auf Lager, Lieferzeit 1-2 Werktage
Kategorien:
Beschreibung
"A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and implement ready-to-use security tools. Features code examples in Python and hands-on proof-of-concept projects for solving real-world problems"--
"A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and implement ready-to-use security tools. Features code examples in Python and hands-on proof-of-concept projects for solving real-world problems"--
Über den Autor
Daniel Reilly is a security researcher, analyst, and consultant based out of Seattle, WA. He has worked in the security field for 20 years, more than half of which has been spent developing and managing operational security for small businesses.
Inhaltsverzeichnis
Acknowledgments
Introduction
PART I: ENVIRONMENT AND CONVENTIONS
Chapter 1: Setting up the Environment
Chapter 2: Programming and Math Conventions
PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRY
Chapter 3: Securing Networks with Graph Theory
Chapter 4: Building a Network Traffic Analysis Tool
Chapter 5: Identifying Threats with Social Network Analysis
Chapter 6: Analyzing Social Networks to Prevent Security Incidents
Chapter 7: Using Geometry to Improve Security Practices
Chapter 8: Tracking People in Physical Space with Digital Information
Chapter 9: Computational Geometry for Safety Resource Distribution
Chapter 10: Computational Geometry for Facial Recognition
PART III: THE ART GALLERY PROBLEM
Chapter 11: Distributing Security Resources to Guard a Space
Chapter 12: The Minimum Viable Product Approach to Security Software Development
Chapter 13: Delivering Python Applications
Notes
Index
Introduction
PART I: ENVIRONMENT AND CONVENTIONS
Chapter 1: Setting up the Environment
Chapter 2: Programming and Math Conventions
PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRY
Chapter 3: Securing Networks with Graph Theory
Chapter 4: Building a Network Traffic Analysis Tool
Chapter 5: Identifying Threats with Social Network Analysis
Chapter 6: Analyzing Social Networks to Prevent Security Incidents
Chapter 7: Using Geometry to Improve Security Practices
Chapter 8: Tracking People in Physical Space with Digital Information
Chapter 9: Computational Geometry for Safety Resource Distribution
Chapter 10: Computational Geometry for Facial Recognition
PART III: THE ART GALLERY PROBLEM
Chapter 11: Distributing Security Resources to Guard a Space
Chapter 12: The Minimum Viable Product Approach to Security Software Development
Chapter 13: Delivering Python Applications
Notes
Index
Details
Erscheinungsjahr: | 2023 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Einband - flex.(Paperback) |
ISBN-13: | 9781718502567 |
ISBN-10: | 1718502567 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Reilly, Daniel |
Hersteller: | Random House LLC US |
Maße: | 233 x 179 x 21 mm |
Von/Mit: | Daniel Reilly |
Erscheinungsdatum: | 24.10.2023 |
Gewicht: | 0,606 kg |
Über den Autor
Daniel Reilly is a security researcher, analyst, and consultant based out of Seattle, WA. He has worked in the security field for 20 years, more than half of which has been spent developing and managing operational security for small businesses.
Inhaltsverzeichnis
Acknowledgments
Introduction
PART I: ENVIRONMENT AND CONVENTIONS
Chapter 1: Setting up the Environment
Chapter 2: Programming and Math Conventions
PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRY
Chapter 3: Securing Networks with Graph Theory
Chapter 4: Building a Network Traffic Analysis Tool
Chapter 5: Identifying Threats with Social Network Analysis
Chapter 6: Analyzing Social Networks to Prevent Security Incidents
Chapter 7: Using Geometry to Improve Security Practices
Chapter 8: Tracking People in Physical Space with Digital Information
Chapter 9: Computational Geometry for Safety Resource Distribution
Chapter 10: Computational Geometry for Facial Recognition
PART III: THE ART GALLERY PROBLEM
Chapter 11: Distributing Security Resources to Guard a Space
Chapter 12: The Minimum Viable Product Approach to Security Software Development
Chapter 13: Delivering Python Applications
Notes
Index
Introduction
PART I: ENVIRONMENT AND CONVENTIONS
Chapter 1: Setting up the Environment
Chapter 2: Programming and Math Conventions
PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRY
Chapter 3: Securing Networks with Graph Theory
Chapter 4: Building a Network Traffic Analysis Tool
Chapter 5: Identifying Threats with Social Network Analysis
Chapter 6: Analyzing Social Networks to Prevent Security Incidents
Chapter 7: Using Geometry to Improve Security Practices
Chapter 8: Tracking People in Physical Space with Digital Information
Chapter 9: Computational Geometry for Safety Resource Distribution
Chapter 10: Computational Geometry for Facial Recognition
PART III: THE ART GALLERY PROBLEM
Chapter 11: Distributing Security Resources to Guard a Space
Chapter 12: The Minimum Viable Product Approach to Security Software Development
Chapter 13: Delivering Python Applications
Notes
Index
Details
Erscheinungsjahr: | 2023 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Einband - flex.(Paperback) |
ISBN-13: | 9781718502567 |
ISBN-10: | 1718502567 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Reilly, Daniel |
Hersteller: | Random House LLC US |
Maße: | 233 x 179 x 21 mm |
Von/Mit: | Daniel Reilly |
Erscheinungsdatum: | 24.10.2023 |
Gewicht: | 0,606 kg |
Warnhinweis