Hands-on artificial intelligence for cybersecurity: implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
2019
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-706 |
Zusammenfassung: | If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets |
Beschreibung: | Description based upon print version of record. - A Bayesian spam detector with NLTK |
Beschreibung: | 1 Online-Ressource (viii, 316 Seiten) |
ISBN: | 9781789805178 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046228292 | ||
003 | DE-604 | ||
005 | 20211006 | ||
007 | cr|uuu---uuuuu | ||
008 | 191104s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781789805178 |9 978-1-78980-517-8 | ||
035 | |a (ZDB-4-NLEBK)2225815 | ||
035 | |a (OCoLC)1126563694 | ||
035 | |a (DE-599)BVBBV046228292 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 |a DE-706 | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
100 | 1 | |a Parisi, Alessandro |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hands-on artificial intelligence for cybersecurity |b implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies |c Alessandro Parisi |
264 | 1 | |a Birmingham ; Mumbai |b Packt |c 2019 | |
300 | |a 1 Online-Ressource (viii, 316 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record. - A Bayesian spam detector with NLTK | ||
505 | 8 | |a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization | |
520 | |a If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Machine learning | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Machine learning |2 fast | |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-78980-402-7 |
912 | |a ZDB-30-PQE |a ZDB-5-WPSE |a ZDB-4-NLEBK | ||
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=5847212 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2225815 |l DE-706 |p ZDB-4-NLEBK |q UBY01_DDA21 |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1805069244237348864 |
---|---|
adam_text | |
any_adam_object | |
author | Parisi, Alessandro |
author_facet | Parisi, Alessandro |
author_role | aut |
author_sort | Parisi, Alessandro |
author_variant | a p ap |
building | Verbundindex |
bvnumber | BV046228292 |
classification_rvk | ST 300 |
collection | ZDB-30-PQE ZDB-5-WPSE ZDB-4-NLEBK |
contents | Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization |
ctrlnum | (ZDB-4-NLEBK)2225815 (OCoLC)1126563694 (DE-599)BVBBV046228292 |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV046228292</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211006</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191104s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789805178</subfield><subfield code="9">978-1-78980-517-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-NLEBK)2225815</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1126563694</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046228292</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Parisi, Alessandro</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hands-on artificial intelligence for cybersecurity</subfield><subfield code="b">implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies</subfield><subfield code="c">Alessandro Parisi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 316 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record. - A Bayesian spam detector with NLTK</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Machine learning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-78980-402-7</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-5-WPSE</subfield><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=5847212</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2225815</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">UBY01_DDA21</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046228292 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T04:02:57Z |
institution | BVB |
isbn | 9781789805178 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031606809 |
oclc_num | 1126563694 |
open_access_boolean | |
owner | DE-1050 DE-706 |
owner_facet | DE-1050 DE-706 |
physical | 1 Online-Ressource (viii, 316 Seiten) |
psigel | ZDB-30-PQE ZDB-5-WPSE ZDB-4-NLEBK ZDB-30-PQE FHD01_PQE_Kauf ZDB-4-NLEBK UBY01_DDA21 |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt |
record_format | marc |
spelling | Parisi, Alessandro Verfasser aut Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Alessandro Parisi Birmingham ; Mumbai Packt 2019 1 Online-Ressource (viii, 316 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based upon print version of record. - A Bayesian spam detector with NLTK Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets Computer security Machine learning Computer security fast Machine learning fast Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Künstliche Intelligenz (DE-588)4033447-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Druck-Ausgabe 978-1-78980-402-7 |
spellingShingle | Parisi, Alessandro Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization Computer security Machine learning Computer security fast Machine learning fast Künstliche Intelligenz (DE-588)4033447-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4033447-8 (DE-588)4274324-2 |
title | Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies |
title_auth | Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies |
title_exact_search | Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies |
title_full | Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Alessandro Parisi |
title_fullStr | Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Alessandro Parisi |
title_full_unstemmed | Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Alessandro Parisi |
title_short | Hands-on artificial intelligence for cybersecurity |
title_sort | hands on artificial intelligence for cybersecurity implement smart ai systems for preventing cyber attacks and detecting threats and network anomalies |
title_sub | implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies |
topic | Computer security Machine learning Computer security fast Machine learning fast Künstliche Intelligenz (DE-588)4033447-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security Machine learning Künstliche Intelligenz Computersicherheit |
work_keys_str_mv | AT parisialessandro handsonartificialintelligenceforcybersecurityimplementsmartaisystemsforpreventingcyberattacksanddetectingthreatsandnetworkanomalies |