| 000 | 01783cam a2200469 i 4500 | ||
|---|---|---|---|
| 999 |
_c12865 _d12865 |
||
| 001 | E-92 | ||
| 003 | BD-ChUET | ||
| 005 | 20230829111623.0 | ||
| 008 | 170831s2016 ne a b 001 0 eng c | ||
| 010 | _a 2017394963 | ||
| 015 |
_aGBB683617 _2bnb |
||
| 016 | 7 |
_a017887920 _2Uk |
|
| 020 | _a9780128044520 (paperback) | ||
| 020 | _a0128044527 (paperback) | ||
| 020 | _z9780128044995 (ePub ebook) | ||
| 035 | _a(OCoLC)ocn964509194 | ||
| 040 |
_aSISPL _beng _erda _cSISPL _dBD-ChUET _dBTCTA _dBDX _dOCLCQ _dDGU _dOCLCA _dUKMGB _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bM4866 2016 |
| 082 | 0 | 0 |
_a005.801/LEC _223 |
| 100 | 1 |
_aMetcalf, Leigh _c(Computer security researcher), _eauthor. |
|
| 245 | 1 | 0 |
_aCybersecurity and applied mathematics / _cLeigh Metcalf, William Casey. |
| 260 |
_aAmsterdam ; _bElsevier, _cc2016. |
||
| 264 | 4 | _c©2016 | |
| 300 |
_axi, 188 pages : _billustrations ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 365 |
_aBDT _b10000.001 |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aMetrics, similarity, and sets -- Probability models -- Introduction to data analysis -- Graph theory -- Game theory -- Visualizing cybersecurity data -- String analysis for cyber strings -- Persistent homology. | |
| 526 | _aCSE | ||
| 546 | _aEnglish | ||
| 650 | 0 |
_aComputer security _xMathematics. |
|
| 700 | 1 |
_aCasey, William _q(William A.), _eauthor. |
|
| 776 | 0 | 8 |
_iebook version : _z9780128044995 |
| 856 | _uhttps://www.sciencedirect.com/science/book/9780128044520 | ||
| 906 |
_a7 _bcbc _cpccadap _d2 _encip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cEBK |
||