• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Mathematics in Cyber Research

    Mathematics in Cyber Research by Goethals, Paul L.; Scala, Natalie M.; Bennett, Daniel T.;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 175.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        83 606 Ft (79 625 Ft + 5% VAT)
      • Discount 20% (cc. 16 721 Ft off)
      • Discounted price 66 885 Ft (63 700 Ft + 5% VAT)

    83 606 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 1
    • Publisher Chapman and Hall
    • Date of Publication 7 February 2022

    • ISBN 9780367374679
    • Binding Hardback
    • No. of pages524 pages
    • Size 254x178 mm
    • Weight 997 g
    • Language English
    • Illustrations 115 Illustrations, black & white; 115 Line drawings, black & white; 35 Tables, black & white
    • 235

    Categories

    Short description:

    This book aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies.

    More

    Long description:

    In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion on cyber matters at national and international levels has focused primarily on the topics of law, policy, and strategy. The objective of these efforts is typically to promote security by establishing agreements among stakeholders on regulatory activities. Varying levels of investment in cyberspace, however, comes with varying levels of risk; in some ways, this can translate directly to the degree of emphasis for pushing substantial change.


    At the very foundation or root of cyberspace systems and processes are tenets and rules governed by principles in mathematics. Topics such as encrypting or decrypting file transmissions, modeling networks, performing data analysis, quantifying uncertainty, measuring risk, and weighing decisions or adversarial courses of action represent a very small subset of activities highlighted by mathematics. To facilitate education and a greater awareness of the role of mathematics in cyber systems and processes, a description of research in this area is needed.


    Mathematics in Cyber Research aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies.

    Features




    • One of the only books to bring together such a diverse and comprehensive range of topics within mathematics and apply them to cyber research.



    • Suitable for college undergraduate students or educators that are either interested in learning about cyber-related mathematics or intend to perform research within the cyber domain. The book may also appeal to practitioners within the commercial or government industry sectors.



    • Most national and international venues for collaboration and discussion on cyber matters have focused primarily on the topics of law, policy, strategy, and technology. This book is among the first to address the underpinning mathematics.



    "This volume edited by Goethals (United States Military Academy), Scala (Towson Univ.), and Bennett (National Renewable Energy Laboratory) is one of the best showcases of foundational algorithms and new research directions applied to computing this reviewer has seen. The range of topics could provide a basis for implementation in many areas. Although it would be impossible to cover all mathematical contributions to computer science in one book, the breadth of content here inspires awe. Fields include combinatorics, cryptography, data analytics, game theory, and quantum theory, and cybersecurity is emphasized in several chapters. Contributing authors position their material in the context of interconnectivity, the Internet of Things, and quantum computing. Readers will need significant background in linear algebra, calculus, and statistics. Naturally, foundational knowledge in computer science (networking, AI, and the theory of computation) will be helpful. A list of references accompanies each chapter, facilitating preliminary research toward more-advanced studies. Overall, the book is an excellent resource for students interested in applied math or advanced algorithms and for experienced scientists, educators, or practitioners who must investigate mathematical topics in a computing domain. Practically all areas covered are worthy of attention from graduate and postgraduate researchers. In addition, many sections include practical applications in computing and system development.


    Summing Up: Highly recommended. Lower- and upper-division undergraduates. Graduate students, faculty, and professionals."
    - J. Brzezinski, McHenry County College, CHOICE Review


     

    More

    Table of Contents:

    1. Combinatorics. 2. Cryptography. 3. Algebraic Geometry. 4. Topology. 5. Differential Equations. 6. Network Science. 7. Operations Research. 8. Data Analysis. 9. Statistics. 10. Probability Theory. 11. Game Theory. 12. Number Theory. 13. Quantum Theory. 14. Group Theory. 15. Ring Theory.


    More
    Recently viewed
    previous
    Mathematics in Cyber Research

    Understanding Boat Batteries and Battery Charging

    Payne, John C.;

    5 250 HUF

    4 830 HUF

    20% %discount
    Mathematics in Cyber Research

    Mathematics in Cyber Research

    Goethals, Paul L.; Scala, Natalie M.; Bennett, Daniel T.; (ed.)

    83 606 HUF

    66 885 HUF

    20% %discount
    Mathematics in Cyber Research

    Handbook of Chronic Myeloid Leukemia

    Hughes, Timothy P; Ross, David M; Melo, Junia V

    22 184 HUF

    17 748 HUF

    20% %discount
    Mathematics in Cyber Research

    Synoptic Problems: Collected Essays

    Kloppenborg, John S.

    94 977 HUF

    75 982 HUF

    Mathematics in Cyber Research

    Peanuts All Year-Round Mini Collection

    Schulz, Charles M.

    10 548 HUF

    9 704 HUF

    20% %discount
    Mathematics in Cyber Research

    Robotics in Education: RiE 2022

    Lepuschitz, Wilfried; Merdan, Munir; Koppensteiner, Gottfried;

    97 628 HUF

    78 102 HUF

    next