edited by Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Boca Raton
نام ناشر، پخش کننده و غيره
C&H/CRC Press
تاریخ نشرو بخش و غیره
2022.
مشخصات ظاهری
نام خاص و کميت اثر
xviii, 505 p.
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references and index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Combinatorics / Cheyne Homberger -- Cryptography / Gretchen L. Matthews, Aidan W. Murphy -- Algebraic geometry / Lubjana Beshaj -- Topology / Steve Huntsman, Jimmy Palladino, Michael Robinson -- Differential equations / Parisa Fatheddin -- Network science / Elie Alhajjar -- Operations research / Paul L. Goethals, Natalie M. Scala, Nathaniel D. Bastian -- Data analysis / Raymond R. Hill, Darryl K. Ahner -- Statistics / Nita Yodo, Melvin Rafi -- Probability theory / David M. Ruth -- Game theory Andrew Fielder -- Number theory / Dane Skabelund -- Quantum theory / Travis B. Russell -- Group theory / William Cocke -- Ring theory / Lindsey-Kay Lauderdale.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
"In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion on cyber matters at national and international levels has focused primarily on the topics of law, policy, and strategy. The objective of these efforts is typically to promote security by establishing agreements among stakeholders on regulatory activities. Varying levels of investment in cyberspace, however, comes with varying levels of risk; in some ways, this can translate directly to the degree of emphasis for pushing substantial change. At the very foundation or root of cyberspace systems and processes are tenets and rules governed by principles in mathematics. Topics such as encrypting or decrypting file transmissions, modeling networks, performing data analysis, quantifying uncertainty, measuring risk, and weighing decisions or adversarial courses of action represent a very small subset of activities highlighted by mathematics. To facilitate education and a greater awareness of the role of mathematics in cyber systems and processes, a description of research in this area is needed. Mathematics in Cyber Research aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies. Features
موضوع (اسم عام یاعبارت اسمی عام)
عنصر شناسه ای
Computer science
عنصر شناسه ای
Cyberspace
عنصر شناسه ای
Operations research
تقسیم فرعی موضوعی
Mathematics.
تقسیم فرعی موضوعی
Mathematics.
تقسیم فرعی موضوعی
Mathematics.
رده بندی ديویی
ويراست
23
رده بندی کنگره
شماره رده
QA76
.
9
نشانه اثر
.
M35
2022
نام شخص - ( مسئولیت معنوی درجه دوم )
عنصر شناسه اي
Goethals, Paul L.,
عنصر شناسه اي
Scala, Natalie M.
عنصر شناسه اي
Bennett, Daniel T.,
---
(Natalie Michele),
مبدا اصلی
کشور
ایران
سازمان
University of Tehran. Library of College of Science