Math for Security From Graphs and Geometry to Spatial Analysis 1st Edition by Daniel Reilly – Ebook PDF Instant Download/Delivery: 1718502567, 9781718502567
Full download Math for Security From Graphs and Geometry to Spatial Analysis 1st Edition after payment
Product details:
ISBN 10: 1718502567
ISBN 13: 9781718502567
Author: Daniel Reilly
Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book. Explore the intersection of mathematics and computer security with this engaging and accessible guide. Math for Security will equip you with essential tools to tackle complex security problems head on. All you need are some basic programming skills. Once you’ve set up your development environment and reviewed the necessary Python syntax and math notation in the early chapters, you’ll dive deep into practical applications, leveraging the power of math to analyze networks, optimize resource distribution, and much more. In the book’s final chapters, you’ll take your projects from proof of concepts to viable applications and explore options for delivering them to end users. As you work through various security scenarios, you’ll: Employ packet analysis and graph theory to detect data exfiltration attempts in a network Predict potential targets and find weaknesses in social networks with Monte Carlo simulations Use basic geometry and OpenCell data to triangulate a phone’s location without GPS Apply computational geometry to Voronoi diagrams for use in emergency service planning Train a facial recognition system with machine learning for real-time identity verification Use spatial analysis to distribute physical security features effectively in an art gallery Whether you’re an aspiring security professional, a social network analyst, or an innovator seeking to create cutting-edge security solutions, this book will empower you to solve complex problems with precision and confidence. Embrace the intricate world of math as your secret weapon in computer security! Covers Python 3.x
Math for Security From Graphs and Geometry to Spatial Analysis 1st Table of contents:
Part I: Environment and Conventions
Chapter 1: Setting Up the Environment
Simple Environment Configuration with Anaconda
Linux
Windows
macOS
Setting Up a Virtual Environment
Installing the IDE with Anaconda
Advanced Setup
Setting Up virtualenv
Installing the IDE without Anaconda
Jupyter Notebooks
Summary
Chapter 2: Programming and Math Conventions
Syntactical Constructs
List Comprehensions
Dictionary Comprehensions
Zipping and Unpacking
Mathematical Notation
Boolean Notation
Set Notation
Attribute Characters
Greek Letters and Functions
Summary
Part II: Graph Theory and Computational Geometry
Chapter 3: Securing Networks with Graph Theory
Graph Theory for Security Applications
Creating Graphs in NetworkX
Discovering Relationships in Data
Measuring Node Importance
Analyzing Cliques to Track Associations
Determining the Connectedness of the Network
Using Graph Edges to Capture Important Details
Summary
Chapter 4: Building a Network Traffic Analysis Tool
Network Topology Visualization
Converting Network Information into a Graph
Building a Communication Map
Building the Graph
Identifying Suspicious Machine Behavior
Subgraph of Port Data Volume
Identifying Unusual Levels of Traffic
Examining How Machines Interact on the Network
The Proof of Concept: Network Traffic Analysis
Summary
Chapter 5: Identifying Threats with Social Network Analysis
The Small-World Phenomenon
Graphing Social Network Data
Structuring the Data
Visualizing the Social Network
Network Analysis Insights
Calculating Information Propagation
Identifying Cliques and Most Influential Users
Finding the Most Influenced Users
Using Topic-Based Information Exchange
Analyzing Network Organization
The Proof of Concept: Social Network Analysis
The Darker Side of Social Network Analysis
Summary
Chapter 6: Analyzing Social Networks to Prevent Security Incidents
Using Monte Carlo Simulations to Predict Attacks
Finite State Machines
Network Modeling with Random Walks
Monte Carlo Simulation
Simulating Social Networks
Modeling User Interaction
Modeling Topic-Based Influence
Modeling Information Flow
The Proof of Concept: Disrupting the Flow of Information
Modeling an Evolving Network
Moving the Message Through the Network
Measuring the Amount of Information Flow
How the Game Works
The Game Objective
The Game Simulation
Improvements to Player 2
Summary
Chapter 7: Using Geometry to Improve Security Practices
Describing Shapes
Points and Lines
Polygons
Vertex Order
Scenario: Planning Security for a Concert
Calculating Safe Occupancy Limits
Determining Placement of Security Personnel
Estimating Guard Patrol Timing
Improving Guard Placement
Summary
Chapter 8: Tracking People in Physical Space with Digital Information
Gathering Cellular Network Data
Ethics of Tracking Devices and People
The OpenCellID API Structure
The Proof of Concept: Locating a Device from Nearby Cell Towers
Gathering Tower Locations
Translating a Geographic Point to a Polygon
Calculating the Search Area
Mapping the Search Area for Investigators
Reducing the Search Area
Summary
Chapter 9: Computational Geometry for Safety Resource Distribution
Using Voronoi Tessellation for Resource Distribution
The Proof of Concept: Analyzing Fire Station Coverage
Defining the Distance Function
Determining the City Shape
Gathering the Locations of Existing Fire Stations
Performing the Voronoi Analysis
Limitations of the Algorithm
Summary
Chapter 10: Computational Geometry for Facial Recognition
Uses of Facial Recognition in Security
Ethics of Facial Recognition Research
The Facial Recognition Algorithm
Using Decision Tree Classifiers
Representing Facial Geometry
Processing Image Data
Locating Facial Landmarks
The Proof of Concept: Developing a Facial Recognition System
Facial Statistics
Memory Management
Data Loading
Feature Engineering
Model Training
Model Persistence
Summary
Part III: The Art Gallery Problem
Chapter 11: Distributing Security Resources to Guard a Space
Determining the Minimum Number of Guards
Art Gallery Problem Theory
Geometric and Graph Representations of the Gallery
Securing the Gallery
Mapping Guard Coverage
Defining Obstructed Areas
Prioritizing Guard Coverage Areas
Mapping Security Camera Field of View
Summary
Chapter 12: The Minimum Viable Product Approach to Security Software Development
Mapping the User’s Interactions
Planning Application States
Documenting the Application
Developing the State Manager
Accelerating Security with Parallel Processing
Threading Parallelism
Processor Parallelism
Adding a Graphical User Interface
Displaying and Managing Images in PyGame
Organizing Graphics with Sprites and Layers
Saving and Reloading Project Data
Saving to a Dictionary
Loading from JSON Files
Running the Example Application
Summary
Chapter 13: Delivering Python Applications
Using Setup Scripts
Packaging with Python Interpreters
Distributing with Cloud Microservices
Licensing with PyArmor
Open Source Delivery
Summary
People also search for Math for Security From Graphs and Geometry to Spatial Analysis 1st:
what type of math is geometry
does geometry use algebra
what grade math is geometry
how much algebra do you need for geometry
Tags:
Daniel Reilly,Security,Graphs,Geometry,Analysis