Reilly Daniel - Math for Security: From Graphs and Geometry to Spatial Analysis / Математика для обеспечения безопасности: от графов и геометрии до пространственного анализа [2023, PDF, EPUB, MOBI, ENG]

Reply to topic
DL-List and Torrent activity
Size:  36 MB   |    Registered:  11 months 19 days   |    Completed:  1 time
Seeders:  768  [  0 KB/s  ]   Leechers:  13  [  0 KB/s  ]   Show peers in full details
 
   
 
 
Author Message

Find a password ®

Gender: Female

Longevity: 9 years

Posts: 2288

Post 05-Mar-2024 10:50

[Quote]

Math for Security: From Graphs and Geometry to Spatial Analysis / Математика для обеспечения безопасности: от графов и геометрии до пространственного анализа
Год издания: 2023
Автор: Reilly Daniel
Издательство: No Starch Press, Inc.
ISBN: 978-1-7185-0257-4
Язык: Английский
Формат: PDF, EPUB, MOBI
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 314
Описание: Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book.
Explore the intersection of mathematics and computer security with this engaging and accessible guide.
Math for Security will equip you with essential tools to tackle complex security problems head on. All you need are some basic programming skills. Once you’ve set up your development environment and reviewed the necessary Python syntax and math notation in the early chapters, you’ll dive deep into practical applications, leveraging the power of math to analyze networks, optimize resource distribution, and much more. In the book’s final chapters, you’ll take your projects from proof of concepts to viable applications and explore options for delivering them to end users.
As you work through various security scenarios, you’ll:
Employ packet analysis and graph theory to detect data exfiltration attempts in a network
Predict potential targets and find weaknesses in social networks with Monte Carlo simulations
Use basic geometry and OpenCell data to triangulate a phone’s location without GPS
Apply computational geometry to Voronoi diagrams for use in emergency service planning
Train a facial recognition system with machine learning for real-time identity verification
Use spatial analysis to distribute physical security features effectively in an art gallery
Whether you’re an aspiring security professional, a social network analyst, or an innovator seeking to create cutting-edge security solutions, this book will empower you to solve complex problems with precision and confidence. Embrace the intricate world of math as your secret weapon in computer security!
Используйте прикладную математику для составления карт пожарных частей, разработки программного обеспечения для распознавания лиц, решения проблемы с художественной галереей и многого другого в этой практической книге по информационной безопасности реального мира.
Исследуйте пересечение математики и компьютерной безопасности с помощью этого увлекательного и доступного руководства.
Математика для обеспечения безопасности снабдит вас необходимыми инструментами для решения сложных проблем безопасности в лоб. Все, что вам нужно, - это некоторые базовые навыки программирования. После того как вы настроите свою среду разработки и ознакомитесь с необходимым синтаксисом Python и математическими обозначениями в первых главах, вы глубоко погрузитесь в практические приложения, используя возможности математики для анализа сетей, оптимизации распределения ресурсов и многого другого. В заключительных главах книги вы пройдете путь от проверки концепции до жизнеспособных приложений и изучите варианты их доставки конечным пользователям.
Работая с различными сценариями безопасности, вы будете:
Использовать анализ пакетов и теорию графов для обнаружения попыток утечки данных в сети
Прогнозировать потенциальные цели и находить слабые места в социальных сетях с помощью моделирования методом Монте-Карло
Использовать базовую геометрию и данные OpenCell для триангуляции местоположения телефона без GPS
Применять вычислительную геометрию к диаграммам Вороного для использования в планировании экстренных служб
Обучите систему распознавания лиц с помощью машинного обучения для проверки личности в режиме реального времени
Использовать пространственный анализ для эффективного распределения средств физической защиты в художественной галерее
Являетесь ли вы начинающим специалистом по безопасности, аналитиком социальных сетей или новатором, стремящимся создавать передовые решения для обеспечения безопасности, эта книга поможет вам решать сложные задачи с точностью и уверенностью. Воспользуйтесь сложным миром математики в качестве своего секретного оружия в области компьютерной безопасности!

Примеры страниц (скриншоты)

Оглавление

ACKNOWLEDGMENTS xv
INTRODUCTION xvii
Who Should Read This Book? . xviii
What’s in This Book? . xviii
Why Python? xx
Information Accessibility xxi
Online Resources xxii
PART I: ENVIRONMENT AND CONVENTIONS 1
1
SETTING UP THE ENVIRONMENT 3
Simple Environment Configuration with Anaconda 4
Linux . 4
Windows 6
macOS . 8
Setting Up a Virtual Environment . 9
Installing the IDE with Anaconda . 10
Advanced Setup . 10
Setting Up virtualenv 10
Installing the IDE without Anaconda 11
Jupyter Notebooks 11
Summary . 12
2
PROGRAMMING AND MATH CONVENTIONS 13
Syntactical Constructs 13
List Comprehensions . 14
Dictionary Comprehensions . 15
Zipping and Unpacking 17
Mathematical Notation 18
Boolean Notation 18
Set Notation 20
Attribute Characters 22
Greek Letters and Functions . 22
Summary . 23
PART II: GRAPH THEORY AND
COMPUTATIONAL GEOMETRY 25
3
SECURING NETWORKS WITH GRAPH THEORY 27
Graph Theory for Security Applications . 28
Introduction to Graph Theory 31
Creating Graphs in NetworkX 32
Discovering Relationships in Data 34
Measuring Node Importance . 35
Analyzing Cliques to Track Associations . 39
Determining the Connectedness of the Network . 40
Using Graph Edges to Capture Important Details . 42
Summary . 43
4
BUILDING A NETWORK TRAFFIC ANALYSIS TOOL 45
Network Topology Visualization 46
Converting Network Information into a Graph 47
Building a Communication Map . 48
Building the Graph . 49
Identifying Suspicious Machine Behavior 52
Subgraph of Port Data Volume . 52
Identifying Unusual Levels of Traffic 54
Examining How Machines Interact on the Network . 57
The Proof of Concept: Network Traffic Analysis . 61
Summary . 64
5
IDENTIFYING THREATS WITH SOCIAL NETWORK ANALYSIS 67
The Small-World Phenomenon . 68
Graphing Social Network Data 69
Structuring the Data 69
Visualizing the Social Network 72
Network Analysis Insights 74
Calculating Information Propagation 74
Identifying Cliques and Most Influential Users 76
Finding the Most Influenced Users 78
Using Topic-Based Information Exchange 79
Analyzing Network Organization 83
The Proof of Concept: Social Network Analysis . 87
The Darker Side of Social Network Analysis . 89
Summary . 89
6
ANALYZING SOCIAL NETWORKS TO
PREVENT SECURITY INCIDENTS 91
Using Monte Carlo Simulations to Predict Attacks 92
Finite State Machines 93
Network Modeling with Random Walks . 95
Monte Carlo Simulation 97
Simulating Social Networks 100
Modeling User Interaction . 100
Modeling Topic-Based Influence . 104
Modeling Information Flow 108
The Proof of Concept: Disrupting the Flow of Information . 109
Modeling an Evolving Network 110
Moving the Message Through the Network . 111
Measuring the Amount of Information Flow 112
How the Game Works 113
The Game Objective 117
The Game Simulation . 118
Improvements to Player 2 120
Summary . 124
7
USING GEOMETRY TO IMPROVE SECURITY PRACTICES 127
Describing Shapes 128
Points and Lines . 128
Polygons . 129
Vertex Order . 132
Scenario: Planning Security for a Concert 132
Calculating Safe Occupancy Limits . 133
Determining Placement of Security Personnel . 136
Estimating Guard Patrol Timing 137
Improving Guard Placement 138
Summary . 140
8
TRACKING PEOPLE IN PHYSICAL SPACE WITH
DIGITAL INFORMATION 141
Gathering Cellular Network Data 142
Ethics of Tracking Devices and People . 144
The OpenCellID API Structure . 145
The Proof of Concept: Locating a Device from Nearby Cell Towers . 148
Gathering Tower Locations 149
Translating a Geographic Point to a Polygon . 150
Calculating the Search Area 153
Mapping the Search Area for Investigators 157
Reducing the Search Area . 159
Summary . 159
9
COMPUTATIONAL GEOMETRY FOR
SAFETY RESOURCE DISTRIBUTION 161
Using Voronoi Tessellation for Resource Distribution . 162
The Proof of Concept: Analyzing Fire Station Coverage . 163
Defining the Distance Function . 164
Determining the City Shape . 164
Gathering the Locations of Existing Fire Stations . 167
Performing the Voronoi Analysis . 170
Limitations of the Algorithm 173
Summary . 174
10
COMPUTATIONAL GEOMETRY FOR FACIAL RECOGNITION 175
Uses of Facial Recognition in Security 176
Ethics of Facial Recognition Research 178
The Facial Recognition Algorithm 179
Using Decision Tree Classifiers . 179
Representing Facial Geometry . 182
Processing Image Data . 184
Locating Facial Landmarks 185
The Proof of Concept: Developing a Facial Recognition System . 188
Facial Statistics 189
Memory Management 190
Data Loading . 191
Feature Engineering . 193
Model Training 198
Model Persistence 203
Summary . 204
PART III: THE ART GALLERY PROBLEM 207
11
DISTRIBUTING SECURITY RESOURCES TO GUARD A SPACE 209
Determining the Minimum Number of Guards . 211
Art Gallery Problem Theory 212
Geometric and Graph Representations of the Gallery 214
Securing the Gallery 216
Mapping Guard Coverage 219
Defining Obstructed Areas 223
Prioritizing Guard Coverage Areas 225
Mapping Security Camera Field of View . 229
Summary . 231
12
THE MINIMUM VIABLE PRODUCT APPROACH TO
SECURITY SOFTWARE DEVELOPMENT 233
Mapping the User’s Interactions 234
Planning Application States . 235
Documenting the Application . 236
Developing the State Manager . 237
Accelerating Security with Parallel Processing . 241
Threading Parallelism . 241
Processor Parallelism 243
Adding a Graphical User Interface 245
Displaying and Managing Images in PyGame . 246
Organizing Graphics with Sprites and Layers 248
Saving and Reloading Project Data . 251
Saving to a Dictionary 251
Loading from JSON Files . 252
Running the Example Application 254
Summary . 256
13
DELIVERING PYTHON APPLICATIONS 257
Using Setup Scripts 258
Packaging with Python Interpreters 259
Distributing with Cloud Microservices 260
Licensing with PyArmor 264
Open Source Delivery . 265
Summary . 266
NOTES 269
INDEX 275
[solely-soft.top].t192858.torrent
Torrent: Registered [ 2024-03-05 10:50 ] · 591748FF386BA0571A970EB7A47448759180FB17

12 KB

Status: checked
Completed: 1 times
Size: 36 MB
Rate: 
(Vote: 0)
Have thanked: 1  Thanks   (List)
Reilly Daniel - Math for Security: From Graphs and Geometry to Spatial Analysis / Математика для обеспечения безопасности: от графов и геометрии до пространственного анализа [2023, PDF, EPUB, MOBI, ENG] download torrent for free and without registration
[Profile] [PM]
Display posts:    
Reply to topic

Current time is: 24-Feb 11:18

All times are UTC + 2



You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum