Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Machine Learning Techniques for Cybersecurity, Bertino


Варианты приобретения
Цена: 6288.00р.
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Bertino
Название:  Machine Learning Techniques for Cybersecurity
ISBN: 9783031282584
Издательство: Springer
Классификация:


ISBN-10: 3031282582
Обложка/Формат: Hardback
Страницы: 165
Вес: 0.49 кг.
Дата издания: 23.04.2023
Серия: Synthesis Lectures on Information Security, Privacy, and Trust
Язык: English
Издание: 1st ed. 2023
Иллюстрации: 30 illustrations, color; 7 illustrations, black and white; xii, 165 p. 37 illus., 30 illus. in color.
Размер: 240 x 168
Читательская аудитория: Professional & vocational
Основная тема: Computer Science
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.
Дополнительное описание: Introduction.- Background on Machine Learning Techniques.- Security Policy earning.- Software Security Analysis.- Hardware Security Analysis.- Detection.- Attack Management.- Case Studies.- Main Challenges in the Use of ML for Security.- Concluding Remark



Practical Machine Learning with H2O

Автор: Darren Cook
Название: Practical Machine Learning with H2O
ISBN: 149196460X ISBN-13(EAN): 9781491964606
Издательство: Wiley
Рейтинг:
Цена: 6334.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This hands-on guide teaches you how to use H20 with only minimal math and theory behind the learning algorithms.

Machine Learning for Cybersecurity Cookbook

Автор: Tsukerman Emmanuel
Название: Machine Learning for Cybersecurity Cookbook
ISBN: 1789614678 ISBN-13(EAN): 9781789614671
Издательство: Неизвестно
Рейтинг:
Цена: 9010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book helps data scientists and cybersecurity experts on implementing the latest AI techniques in cybersecurity. Concrete and clear steps for implementing ML security systems are provided, saving you months in research and development. By the end of this book, you will be able to build defensive systems to curb cybersecurity threats.

Research Anthology on Machine Learning Techniques, Methods, and Applications

Название: Research Anthology on Machine Learning Techniques, Methods, and Applications
ISBN: 1668462915 ISBN-13(EAN): 9781668462911
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 256964.00 р.
Наличие на складе: Нет в наличии.

Описание: Offers a thorough consideration of the innovative and emerging research within the area of machine learning. The book discusses how the technology has been used in the past as well as potential ways it can be used in the future to ensure industries continue to develop and grow.

Hands-On Machine Learning with Scikit-Learn, Keras, and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems

Автор: Geron Aurelien
Название: Hands-On Machine Learning with Scikit-Learn, Keras, and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems
ISBN: 1492032646 ISBN-13(EAN): 9781492032649
Издательство: Wiley
Рейтинг:
Цена: 9502.00 р.
Наличие на складе: Поставка под заказ.

Описание:

Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data.

The updated edition of this practical book uses concrete examples, minimal theory, and three production-ready Python frameworks--scikit-learn, Keras, and TensorFlow--to help you gain an intuitive understanding of the concepts and tools for building intelligent systems. You'll learn a range of techniques, starting with simple linear regression and progressing to deep neural networks. With exercises in each chapter to help you apply what you've learned, all you need is programming experience to get started.

Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career

Автор: Auger Gerald, Scott Jaclyn Jax, Helmus Jonathan
Название: Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career
ISBN: 1801073562 ISBN-13(EAN): 9781801073561
Издательство: Неизвестно
Рейтинг:
Цена: 10918.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Get started with cybersecurity and progress with the help of expert tips to get certified, find a job, and more


Key Features:

  • Learn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurity
  • Explore expert tips relating to career paths and certification options
  • Access informative content from a panel of experienced cybersecurity experts


Book Description:

Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.


This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you'll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you'll discover the importance of defining and understanding your brand. Finally, you'll get up to speed with different career paths and learning opportunities.


By the end of this cyber book, you will have gained the knowledge you need to clearly define your career path and develop goals relating to career progression.


What You Will Learn:

  • Gain an understanding of cybersecurity essentials, including the different frameworks and laws, and specialties
  • Find out how to land your first job in the cybersecurity industry
  • Understand the difference between college education and certificate courses
  • Build goals and timelines to encourage a work/life balance while delivering value in your job
  • Understand the different types of cybersecurity jobs available and what it means to be entry-level
  • Build affordable, practical labs to develop your technical skills
  • Discover how to set goals and maintain momentum after landing your first cybersecurity job


Who this book is for:

This book is for college graduates, military veterans transitioning from active service, individuals looking to make a mid-career switch, and aspiring IT professionals. Anyone who considers cybersecurity as a potential career field but feels intimidated, overwhelmed, or unsure of where to get started will also find this book useful.

Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents

Автор: Ozkaya Erdal
Название: Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
ISBN: 1800569211 ISBN-13(EAN): 9781800569218
Издательство: Неизвестно
Рейтинг:
Цена: 8091.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Learn to identify a security incident and build a series of best practices to stop an attack before it creates serious consequences


Key Features

  • Discover the entire spectrum of Incident Response (IR), from its evolution to recovery in general as well as in the cloud
  • Understand IR best practices through real-world phishing incident scenarios
  • Explore the current challenges in IR through the perspectives of leading figures in the cybersecurity community


Book Description

Cybercriminals are always in search of new methods and ways to infiltrate systems. Quickly responding to an incident should help an organization minimize its losses, decrease vulnerabilities, and rebuild services and processes. An organization without knowledge of how to effectively implement key IR best practices is highly prone to cyber-attacks.


In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and the cloud, this book provides updated IR processes to address the associated security risks.


The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply this conceptual toolkit, with discussions on incident alerting, handling, investigation, recovery, and reporting.


As you progress through the book, you will cover governing IR on multiple platforms and sharing cyber threat intelligence. You will then thoroughly explore the entire spectrum of procedures involved in IR in the cloud - the challenges, opportunities, and how to handle a phishing incident.


Further, you'll learn how to build a proactive incident readiness culture, learn and implement IR best practices, and explore practical case studies using tools from Keepnet Labs and Binalyze. Finally, the book concludes with an "Ask the Experts" section where industry experts have provided their perspective on diverse topics in the IR sphere.


By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.


What You Will Learn

  • Understand incident response and its significance
  • Organize an incident response team
  • Explore best practices for managing attack situations with your IR team
  • Form, organize, and operate a product security team to deal with product vulnerabilities and assess their severity
  • Organize all the entities involved in product security response
  • Respond to a security vulnerability based on Keepnet Labs processes and practices
  • Adapt all the above learnings for the cloud


Who this Book is for

This book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and users who deal with the security of an organization. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about IT or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book's discussions on individual and organizational security.

The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.

Cybersecurity - attack and defense strategies

Автор: Diogenes, Yuri Ozkaya, Erdal
Название: Cybersecurity - attack and defense strategies
ISBN: 183882779X ISBN-13(EAN): 9781838827793
Издательство: Неизвестно
Рейтинг:
Цена: 15447.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book that covers the very latest security threats and defense strategies, updated for 2020.

Machine Intelligence and Big Data Analytics for Cybersecurity Applications

Автор: Maleh Yassine, Shojafar Mohammad, Alazab Mamoun
Название: Machine Intelligence and Big Data Analytics for Cybersecurity Applications
ISBN: 3030570231 ISBN-13(EAN): 9783030570231
Издательство: Springer
Цена: 27950.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis.

Optimization of sustainable enzymes production

Название: Optimization of sustainable enzymes production
ISBN: 1032273372 ISBN-13(EAN): 9781032273372
Издательство: Taylor&Francis
Рейтинг:
Цена: 13779.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents a systematic approach to analyze evolutionary and nature-inspired population-based search algorithms. The book presents current research on various applications of machine learning and discusses optimization techniques to solve real-life problems.

Machine Learning Techniques for Multimedia

Автор: Matthieu Cord; P?draig Cunningham
Название: Machine Learning Techniques for Multimedia
ISBN: 3642443621 ISBN-13(EAN): 9783642443626
Издательство: Springer
Рейтинг:
Цена: 23058.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Processing multimedia content has emerged as a key area for the application of machine learning techniques, where the objectives are to provide insight into the domain from which the data is drawn, and to organize that data and improve the performance of the processes manipulating it.

Machine Intelligence and Big Data Analytics for Cybersecurity Applications

Автор: Maleh Yassine, Shojafar Mohammad, Alazab Mamoun
Название: Machine Intelligence and Big Data Analytics for Cybersecurity Applications
ISBN: 3030570266 ISBN-13(EAN): 9783030570262
Издательство: Springer
Рейтинг:
Цена: 27950.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis.

Hands-On Machine Learning for Cybersecurity

Автор: Halder Soma, Ozdemir Sinan
Название: Hands-On Machine Learning for Cybersecurity
ISBN: 1788992288 ISBN-13(EAN): 9781788992282
Издательство: Неизвестно
Рейтинг:
Цена: 9010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book will allow readers to implement smart solutions to their existing cybersecurity products and effectively build intelligent solutions which cater to the needs of the future. By the end of this book, you will be able to build, apply, and evaluate machine learning algorithms to identify various cybersecurity potential threats.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия