Acknowledgments
Introduction
PART I: ENVIRONMENT AND CONVENTIONS
Chapter 1: Setting up the Environment
Chapter 2: Programming and Math Conventions
PART II: GRAPH THEORY AND COMPUTATIONAL GEOMETRY
Chapter 3: Securing Networks with Graph Theory
Chapter 4: Building a Network Traffic Analysis Tool
Chapter 5: Identifying Threats with Social Network Analysis
Chapter 6: Analyzing Social Networks to Prevent Security Incidents
Chapter 7: Using Geometry to Improve Security Practices
Chapter 8: Tracking People in Physical Space with Digital Information
Chapter 9: Computational Geometry for Safety Resource Distribution
Chapter 10: Computational Geometry for Facial Recognition
PART III: THE ART GALLERY PROBLEM
Chapter 11: Distributing Security Resources to Guard a Space
Chapter 12: The Minimum Viable Product Approach to Security Software Development
Chapter 13: Delivering Python Applications
Notes
Index