MARC details
000 -LEADER |
fixed length control field |
03364nam a22002777a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230116s2022 |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367374679 |
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER |
ISSN-L |
9780367374679 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.0151 |
Item number |
GEO |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Geothals, Paul L. |
9 (RLIN) |
673629 |
Relator term |
editor |
245 ## - TITLE STATEMENT |
Title |
Mathematics in Cyber Research |
250 ## - EDITION STATEMENT |
Edition statement |
1st |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton, FL : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
c2022 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XVIII, 505 p. |
Other physical details |
: ill |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes Bibliographical References and Index |
520 ## - SUMMARY, ETC. |
Summary, etc. |
SUMMARY:<br/>In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion on cyber matters at national and international levels has focused primarily on the topics of law, policy, and strategy. The objective of these efforts is typically to promote security by establishing agreements among stakeholders on regulatory activities. Varying levels of investment in cyberspace, however, comes with varying levels of risk; in some ways, this can translate directly to the degree of emphasis for pushing substantial change.<br/><br/>At the very foundation or root of cyberspace systems and processes are tenets and rules governed by principles in mathematics. Topics such as encrypting or decrypting file transmissions, modeling networks, performing data analysis, quantifying uncertainty, measuring risk, and weighing decisions or adversarial courses of action represent a very small subset of activities highlighted by mathematics. To facilitate education and a greater awareness of the role of mathematics in cyber systems and processes, a description of research in this area is needed.<br/><br/>Mathematics in Cyber Research aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies.<br/><br/>Features<br/><br/> One of the only books to bring together such a diverse and comprehensive range of topics within mathematics and apply them to cyber research.<br/><br/> Suitable for college undergraduate students or educators that are either interested in learning about cyber-related mathematics or intend to perform research within the cyber domain. The book may also appeal to practitioners within the commercial or government industry sectors.<br/><br/> Most national and international venues for collaboration and discussion on cyber matters have focused primarily on the topics of law, policy, strategy, and technology. This book is among the first to address the underpinning mathematics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
673729 |
Topical term or geographic name entry element |
Operations Research Mathematics |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
156820 |
Topical term or geographic name entry element |
Computer Science Mathematics |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
673730 |
Topical term or geographic name entry element |
Cyberspace Mathematics |
700 ## - ADDED ENTRY--PERSONAL NAME |
Relator term |
editor |
Personal name |
Scala, Natalie M. |
9 (RLIN) |
673732 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Relator term |
editor |
Personal name |
Bennett, Daniel T. |
9 (RLIN) |
673733 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
TOC |
Uniform Resource Identifier |
<a href="https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780367374679.pdf">https://eaklibrary.neduet.edu.pk:8443/catalog/bk/books/toc/9780367374679.pdf</a> |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Link text |
PUBLISHER LINK |
Uniform Resource Identifier |
<a href="https://www.routledge.com/Mathematics-in-Cyber-Research/Goethals-Scala-Bennett/p/book/9780367374679">https://www.routledge.com/Mathematics-in-Cyber-Research/Goethals-Scala-Bennett/p/book/9780367374679</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book |