Mathematics in Cybersecurity

Author:   Alfred Basta (North Greenville University, SC, USA; ISACA; ECE; Mathematical Association of America) ,  Stavros Basta ,  Stephan Delong (Tidewater Community College, VA, USA)
Publisher:   John Wiley & Sons Inc
ISBN:  

9781394304769


Pages:   512
Publication Date:   02 March 2026
Format:   Hardback
Availability:   Awaiting stock   Availability explained


Our Price $198.95 Quantity:  
Pre-Order

Share |

Mathematics in Cybersecurity


Overview

Balanced, in-depth exploration of mathematics in cybersecurity, supported by case studies and other learning features With clear and concise explanations, practical examples, case studies, and real-world applications, Mathematics in Cybersecurity is an essential learning aid for readers seeking an understanding of the fundamental concepts in the field. This comprehensive book delves into a wide range of topics, including sets, logic, binary and other number systems, logic gates, combinatorial logic circuits, equations and graphs, linear equations and matrices, sequences and series. Other topics covered include right triangle geometry and trigonometry, exponential and logarithmic equations, probability, statistics, graph theory, and cryptography. The book is an ideal companion resource for courses involving mathematical concepts in cybersecurity. It allows tailoring of the content to meet the needs of career education and online schools, ensuring it is comprehensible to students who may be learning remotely and relying on self-study. Mathematics in Cybersecurity also includes information on: Discrete math, set theory fundamentals, propositional logic, and number systems and conversions Digital logic circuits, linear equations and matrices, sequences and recursion, and trigonometry and pre-calculus Complex numbers, exponential and logarithmic functions, and probability and counting techniques Graph theory applications and coding for cryptography By adopting a balanced approach that combines traditional and contemporary ideas, Mathematics in Cybersecurity provides a readable and rigorous treatment of the subject matter for aspiring cybersecurity professionals, equipping them with the necessary tools to tackle complex cybersecurity challenges confidently and excel in their field.

Full Product Details

Author:   Alfred Basta (North Greenville University, SC, USA; ISACA; ECE; Mathematical Association of America) ,  Stavros Basta ,  Stephan Delong (Tidewater Community College, VA, USA)
Publisher:   John Wiley & Sons Inc
Imprint:   John Wiley & Sons Inc
ISBN:  

9781394304769


ISBN 10:   1394304765
Pages:   512
Publication Date:   02 March 2026
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Forthcoming
Availability:   Awaiting stock   Availability explained

Table of Contents

Reviews

Author Information

Alfred Basta, PhD, CMMC CCA, Six-Sigma Black Belt, PMP, CISM, CHPSE, CRISC, CPENT, OSCP is a professor of Mathematics, Cybersecurity, and Computer Science. He is a curriculum advisor for multiple colleges and universities. He has authored a variety of papers and publications in advanced Mathematics, Cybersecurity and Computer Science. Stephan DeLong, PhD, is an Associate Professor of Mathematics at Tidewater Community College, where he has taught since 1993. He earned a Master of Science degree in Mathematics at Lehigh University and is the author of several textbooks in mathematics. Stavros Basta, CIPP/US, CISM, CPENT, LPTM, CEH, SecurityX, PMP is a distinguished cybersecurity consultant and accomplished grant writer whose expertise bridges the theoretical foundations of mathematics with practical cybersecurity applications. With extensive experience in the field, Stavros has established himself as a thought leader in the integration of mathematical principles into cybersecurity frameworks. As a trusted advisor, he serves on numerous global advisory boards dedicated to advancing cybersecurity curricula and shaping privacy legislation across international jurisdictions. His multidisciplinary approach to cybersecurity, informed by rigorous mathematical analysis, offers readers a unique perspective on the quantitative underpinnings of modern digital security protocols.

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

RGFEB26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List