000 01783cam a2200469 i 4500
999 _c12865
_d12865
001 E-92
003 BD-ChUET
005 20230829111623.0
008 170831s2016 ne a b 001 0 eng c
010 _a 2017394963
015 _aGBB683617
_2bnb
016 7 _a017887920
_2Uk
020 _a9780128044520 (paperback)
020 _a0128044527 (paperback)
020 _z9780128044995 (ePub ebook)
035 _a(OCoLC)ocn964509194
040 _aSISPL
_beng
_erda
_cSISPL
_dBD-ChUET
_dBTCTA
_dBDX
_dOCLCQ
_dDGU
_dOCLCA
_dUKMGB
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bM4866 2016
082 0 0 _a005.801/LEC
_223
100 1 _aMetcalf, Leigh
_c(Computer security researcher),
_eauthor.
245 1 0 _aCybersecurity and applied mathematics /
_cLeigh Metcalf, William Casey.
260 _aAmsterdam ;
_bElsevier,
_cc2016.
264 4 _c©2016
300 _axi, 188 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
365 _aBDT
_b10000.001
504 _aIncludes bibliographical references and index.
505 0 _aMetrics, similarity, and sets -- Probability models -- Introduction to data analysis -- Graph theory -- Game theory -- Visualizing cybersecurity data -- String analysis for cyber strings -- Persistent homology.
526 _aCSE
546 _aEnglish
650 0 _aComputer security
_xMathematics.
700 1 _aCasey, William
_q(William A.),
_eauthor.
776 0 8 _iebook version :
_z9780128044995
856 _uhttps://www.sciencedirect.com/science/book/9780128044520
906 _a7
_bcbc
_cpccadap
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cEBK