Description
Book SynopsisApplied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to use concepts from various fields of mathematics - like graph theory, computational geometry, and statistics - to create and implement ready-to-use security tools. The book is written in a lively, conversational style that engages readers from the get-go. Chapters are enriched with code examples written in Python, and feature hands-on 'proof of concept' projects that involve developing math-based applications to solve real-world problems. Readers are also able to apply the mathematical constructs that they learn to a variety of challenging scenarios, like determining the ideal location for fire stations, disrupting information flow in a social network, building facial recognition software, and designing custom tools for modern security work.
Trade Review"A very practical book for security. . . . a real eye-opener."
—William Gasarch, Professor, University of Maryland-Dept of Computer Science"A really nice introduction to graph theory and computational geometry for people who know a bit of Python and without a mathematical background."
—Julien Voisin, Artificial Truth
"The book was very easy to follow, I'd expect anyone with a technical or stats background to be able to dive right in given the step-by-step instructions and explanations provided by Daniel."
—@WithSandra, tech YouTuber and security analyst"Whether you're an aspiring security professional, a social network analyst, or an innovator seeking to create cutting-edge security solutions,
Math for Security will empower you to solve complex problems with precision and confidence. "
—Midwest Book ReviewTable of ContentsAcknowledgments
Introduction
PART I: ENVIRONMENT AND CONVENTIONSChapter 1: Setting up the Environment
Chapter 2: Programming and Math Conventions
PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRYChapter 3: Securing Networks with Graph Theory
Chapter 4: Building a Network Traffic Analysis Tool
Chapter 5: Identifying Threats with Social Network Analysis
Chapter 6: Analyzing Social Networks to Prevent Security Incidents
Chapter 7: Using Geometry to Improve Security Practices
Chapter 8: Tracking People in Physical Space with Digital Information
Chapter 9: Computational Geometry for Safety Resource Distribution
Chapter 10: Computational Geometry for Facial Recognition
PART III: THE ART GALLERY PROBLEMChapter 11: Distributing Security Resources to Guard a Space
Chapter 12: The Minimum Viable Product Approach to Security Software Development
Chapter 13: Delivering Python Applications
Notes
Index