Register · · Password forgotten? · |
Reilly Daniel - Math for Security: From Graphs and Geometry to Spatial Analysis / Математика для обеспечения безопасности
|
![]() |
Home » Books and magazines » Computer literature » Hacking and security |
DL-List and Torrent activity | |
Size: 36 MB | Registered: 11 months 19 days | Completed: 1 time | |
|
Author | Message | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Find a password ® Gender: Longevity: 9 years Posts: 2288 |
Math for Security: From Graphs and Geometry to Spatial Analysis / Математика для обеспечения безопасности: от графов и геометрии до пространственного анализа
Год издания: 2023 Автор: Reilly Daniel Издательство: No Starch Press, Inc. ISBN: 978-1-7185-0257-4 Язык: Английский Формат: PDF, EPUB, MOBI Качество: Издательский макет или текст (eBook) Интерактивное оглавление: Да Количество страниц: 314 Описание: Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book. Explore the intersection of mathematics and computer security with this engaging and accessible guide. Math for Security will equip you with essential tools to tackle complex security problems head on. All you need are some basic programming skills. Once you’ve set up your development environment and reviewed the necessary Python syntax and math notation in the early chapters, you’ll dive deep into practical applications, leveraging the power of math to analyze networks, optimize resource distribution, and much more. In the book’s final chapters, you’ll take your projects from proof of concepts to viable applications and explore options for delivering them to end users. As you work through various security scenarios, you’ll: Employ packet analysis and graph theory to detect data exfiltration attempts in a network Predict potential targets and find weaknesses in social networks with Monte Carlo simulations Use basic geometry and OpenCell data to triangulate a phone’s location without GPS Apply computational geometry to Voronoi diagrams for use in emergency service planning Train a facial recognition system with machine learning for real-time identity verification Use spatial analysis to distribute physical security features effectively in an art gallery Whether you’re an aspiring security professional, a social network analyst, or an innovator seeking to create cutting-edge security solutions, this book will empower you to solve complex problems with precision and confidence. Embrace the intricate world of math as your secret weapon in computer security! Используйте прикладную математику для составления карт пожарных частей, разработки программного обеспечения для распознавания лиц, решения проблемы с художественной галереей и многого другого в этой практической книге по информационной безопасности реального мира. Исследуйте пересечение математики и компьютерной безопасности с помощью этого увлекательного и доступного руководства. Математика для обеспечения безопасности снабдит вас необходимыми инструментами для решения сложных проблем безопасности в лоб. Все, что вам нужно, - это некоторые базовые навыки программирования. После того как вы настроите свою среду разработки и ознакомитесь с необходимым синтаксисом Python и математическими обозначениями в первых главах, вы глубоко погрузитесь в практические приложения, используя возможности математики для анализа сетей, оптимизации распределения ресурсов и многого другого. В заключительных главах книги вы пройдете путь от проверки концепции до жизнеспособных приложений и изучите варианты их доставки конечным пользователям. Работая с различными сценариями безопасности, вы будете: Использовать анализ пакетов и теорию графов для обнаружения попыток утечки данных в сети Прогнозировать потенциальные цели и находить слабые места в социальных сетях с помощью моделирования методом Монте-Карло Использовать базовую геометрию и данные OpenCell для триангуляции местоположения телефона без GPS Применять вычислительную геометрию к диаграммам Вороного для использования в планировании экстренных служб Обучите систему распознавания лиц с помощью машинного обучения для проверки личности в режиме реального времени Использовать пространственный анализ для эффективного распределения средств физической защиты в художественной галерее Являетесь ли вы начинающим специалистом по безопасности, аналитиком социальных сетей или новатором, стремящимся создавать передовые решения для обеспечения безопасности, эта книга поможет вам решать сложные задачи с точностью и уверенностью. Воспользуйтесь сложным миром математики в качестве своего секретного оружия в области компьютерной безопасности! ОглавлениеACKNOWLEDGMENTS xvINTRODUCTION xvii Who Should Read This Book? . xviii What’s in This Book? . xviii Why Python? xx Information Accessibility xxi Online Resources xxii PART I: ENVIRONMENT AND CONVENTIONS 1 1 SETTING UP THE ENVIRONMENT 3 Simple Environment Configuration with Anaconda 4 Linux . 4 Windows 6 macOS . 8 Setting Up a Virtual Environment . 9 Installing the IDE with Anaconda . 10 Advanced Setup . 10 Setting Up virtualenv 10 Installing the IDE without Anaconda 11 Jupyter Notebooks 11 Summary . 12 2 PROGRAMMING AND MATH CONVENTIONS 13 Syntactical Constructs 13 List Comprehensions . 14 Dictionary Comprehensions . 15 Zipping and Unpacking 17 Mathematical Notation 18 Boolean Notation 18 Set Notation 20 Attribute Characters 22 Greek Letters and Functions . 22 Summary . 23 PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRY 25 3 SECURING NETWORKS WITH GRAPH THEORY 27 Graph Theory for Security Applications . 28 Introduction to Graph Theory 31 Creating Graphs in NetworkX 32 Discovering Relationships in Data 34 Measuring Node Importance . 35 Analyzing Cliques to Track Associations . 39 Determining the Connectedness of the Network . 40 Using Graph Edges to Capture Important Details . 42 Summary . 43 4 BUILDING A NETWORK TRAFFIC ANALYSIS TOOL 45 Network Topology Visualization 46 Converting Network Information into a Graph 47 Building a Communication Map . 48 Building the Graph . 49 Identifying Suspicious Machine Behavior 52 Subgraph of Port Data Volume . 52 Identifying Unusual Levels of Traffic 54 Examining How Machines Interact on the Network . 57 The Proof of Concept: Network Traffic Analysis . 61 Summary . 64 5 IDENTIFYING THREATS WITH SOCIAL NETWORK ANALYSIS 67 The Small-World Phenomenon . 68 Graphing Social Network Data 69 Structuring the Data 69 Visualizing the Social Network 72 Network Analysis Insights 74 Calculating Information Propagation 74 Identifying Cliques and Most Influential Users 76 Finding the Most Influenced Users 78 Using Topic-Based Information Exchange 79 Analyzing Network Organization 83 The Proof of Concept: Social Network Analysis . 87 The Darker Side of Social Network Analysis . 89 Summary . 89 6 ANALYZING SOCIAL NETWORKS TO PREVENT SECURITY INCIDENTS 91 Using Monte Carlo Simulations to Predict Attacks 92 Finite State Machines 93 Network Modeling with Random Walks . 95 Monte Carlo Simulation 97 Simulating Social Networks 100 Modeling User Interaction . 100 Modeling Topic-Based Influence . 104 Modeling Information Flow 108 The Proof of Concept: Disrupting the Flow of Information . 109 Modeling an Evolving Network 110 Moving the Message Through the Network . 111 Measuring the Amount of Information Flow 112 How the Game Works 113 The Game Objective 117 The Game Simulation . 118 Improvements to Player 2 120 Summary . 124 7 USING GEOMETRY TO IMPROVE SECURITY PRACTICES 127 Describing Shapes 128 Points and Lines . 128 Polygons . 129 Vertex Order . 132 Scenario: Planning Security for a Concert 132 Calculating Safe Occupancy Limits . 133 Determining Placement of Security Personnel . 136 Estimating Guard Patrol Timing 137 Improving Guard Placement 138 Summary . 140 8 TRACKING PEOPLE IN PHYSICAL SPACE WITH DIGITAL INFORMATION 141 Gathering Cellular Network Data 142 Ethics of Tracking Devices and People . 144 The OpenCellID API Structure . 145 The Proof of Concept: Locating a Device from Nearby Cell Towers . 148 Gathering Tower Locations 149 Translating a Geographic Point to a Polygon . 150 Calculating the Search Area 153 Mapping the Search Area for Investigators 157 Reducing the Search Area . 159 Summary . 159 9 COMPUTATIONAL GEOMETRY FOR SAFETY RESOURCE DISTRIBUTION 161 Using Voronoi Tessellation for Resource Distribution . 162 The Proof of Concept: Analyzing Fire Station Coverage . 163 Defining the Distance Function . 164 Determining the City Shape . 164 Gathering the Locations of Existing Fire Stations . 167 Performing the Voronoi Analysis . 170 Limitations of the Algorithm 173 Summary . 174 10 COMPUTATIONAL GEOMETRY FOR FACIAL RECOGNITION 175 Uses of Facial Recognition in Security 176 Ethics of Facial Recognition Research 178 The Facial Recognition Algorithm 179 Using Decision Tree Classifiers . 179 Representing Facial Geometry . 182 Processing Image Data . 184 Locating Facial Landmarks 185 The Proof of Concept: Developing a Facial Recognition System . 188 Facial Statistics 189 Memory Management 190 Data Loading . 191 Feature Engineering . 193 Model Training 198 Model Persistence 203 Summary . 204 PART III: THE ART GALLERY PROBLEM 207 11 DISTRIBUTING SECURITY RESOURCES TO GUARD A SPACE 209 Determining the Minimum Number of Guards . 211 Art Gallery Problem Theory 212 Geometric and Graph Representations of the Gallery 214 Securing the Gallery 216 Mapping Guard Coverage 219 Defining Obstructed Areas 223 Prioritizing Guard Coverage Areas 225 Mapping Security Camera Field of View . 229 Summary . 231 12 THE MINIMUM VIABLE PRODUCT APPROACH TO SECURITY SOFTWARE DEVELOPMENT 233 Mapping the User’s Interactions 234 Planning Application States . 235 Documenting the Application . 236 Developing the State Manager . 237 Accelerating Security with Parallel Processing . 241 Threading Parallelism . 241 Processor Parallelism 243 Adding a Graphical User Interface 245 Displaying and Managing Images in PyGame . 246 Organizing Graphics with Sprites and Layers 248 Saving and Reloading Project Data . 251 Saving to a Dictionary 251 Loading from JSON Files . 252 Running the Example Application 254 Summary . 256 13 DELIVERING PYTHON APPLICATIONS 257 Using Setup Scripts 258 Packaging with Python Interpreters 259 Distributing with Cloud Microservices 260 Licensing with PyArmor 264 Open Source Delivery . 265 Summary . 266 NOTES 269 INDEX 275
|
|||||||||||||||||||||
![]() |
Home » Books and magazines » Computer literature » Hacking and security |
Current time is: 24-Feb 11:18
All times are UTC + 2
You cannot post new topics in this forum
You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum |