Artificial intelligence for security:
Chapter 1. Introduction -- Chapter 2. Introduction to security -- Chapter 3. How AI and security come together? -- Chapter 4. Knowledgebase -- Chapter 5. AI solutions for security -- Chapter 6. Industry domain -- Chapter 7. Conclusion
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, New York (222 East 46th Street, New York, NY 10017)
Business Expert Press
2020
|
Ausgabe: | First edition |
Schriftenreihe: | Business law and corporate risk management collection
|
Schlagworte: | |
Online-Zugang: | FHN01 UBY01 Volltext |
Zusammenfassung: | Chapter 1. Introduction -- Chapter 2. Introduction to security -- Chapter 3. How AI and security come together? -- Chapter 4. Knowledgebase -- Chapter 5. AI solutions for security -- Chapter 6. Industry domain -- Chapter 7. Conclusion Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment |
Beschreibung: | Includes bibliographical references (pages 129-132) and index |
Beschreibung: | 1 Online-Ressource (vi, 139 pages) |
ISBN: | 9781951527273 9781951527266 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047177600 | ||
003 | DE-604 | ||
005 | 20240417 | ||
007 | cr|uuu---uuuuu | ||
008 | 210305s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781951527273 |9 978-1-951527-27-3 | ||
020 | |a 9781951527266 |9 978-1-951527-26-6 | ||
035 | |a (ZDB-191-BEX)9781951527273 | ||
035 | |a (OCoLC)1144893165 | ||
035 | |a (DE-599)BVBBV047177600 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-706 | ||
082 | 0 | |a 006.3 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
100 | 1 | |a Addo, Archie |e Verfasser |4 aut | |
245 | 1 | 0 | |a Artificial intelligence for security |c Archie Addo, Srini Centhala, and Muthu Shanmugam |
250 | |a First edition | ||
264 | 1 | |a New York, New York (222 East 46th Street, New York, NY 10017) |b Business Expert Press |c 2020 | |
300 | |a 1 Online-Ressource (vi, 139 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Business law and corporate risk management collection | |
500 | |a Includes bibliographical references (pages 129-132) and index | ||
520 | |a Chapter 1. Introduction -- Chapter 2. Introduction to security -- Chapter 3. How AI and security come together? -- Chapter 4. Knowledgebase -- Chapter 5. AI solutions for security -- Chapter 6. Industry domain -- Chapter 7. Conclusion | ||
520 | |a Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment | ||
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Business intelligence | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Centhala, Srini |4 aut | |
700 | 1 | |a Shanmugam, Muthu |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781951527266 |
856 | 4 | 0 | |u https://portal.igpublish.com/iglibrary/search/BEPB0000965.html |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-191-BEX | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032582955 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/BEPB0000965.html |l FHN01 |p ZDB-191-BEX |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/BEPB0000965.html |l UBY01 |p ZDB-191-BEX |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182264600330240 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Addo, Archie Centhala, Srini Shanmugam, Muthu |
author_facet | Addo, Archie Centhala, Srini Shanmugam, Muthu |
author_role | aut aut aut |
author_sort | Addo, Archie |
author_variant | a a aa s c sc m s ms |
building | Verbundindex |
bvnumber | BV047177600 |
classification_rvk | ST 276 ST 300 |
collection | ZDB-191-BEX |
ctrlnum | (ZDB-191-BEX)9781951527273 (OCoLC)1144893165 (DE-599)BVBBV047177600 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03214nmm a2200565zc 4500</leader><controlfield tag="001">BV047177600</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240417 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210305s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781951527273</subfield><subfield code="9">978-1-951527-27-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781951527266</subfield><subfield code="9">978-1-951527-26-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-191-BEX)9781951527273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1144893165</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047177600</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Addo, Archie</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial intelligence for security</subfield><subfield code="c">Archie Addo, Srini Centhala, and Muthu Shanmugam</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, New York (222 East 46th Street, New York, NY 10017)</subfield><subfield code="b">Business Expert Press</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vi, 139 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Business law and corporate risk management collection</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 129-132) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Chapter 1. Introduction -- Chapter 2. Introduction to security -- Chapter 3. How AI and security come together? -- Chapter 4. Knowledgebase -- Chapter 5. AI solutions for security -- Chapter 6. Industry domain -- Chapter 7. Conclusion</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Centhala, Srini</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shanmugam, Muthu</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781951527266</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://portal.igpublish.com/iglibrary/search/BEPB0000965.html</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-191-BEX</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032582955</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/BEPB0000965.html</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-191-BEX</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/BEPB0000965.html</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-191-BEX</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047177600 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:44:55Z |
indexdate | 2024-07-10T09:04:47Z |
institution | BVB |
isbn | 9781951527273 9781951527266 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032582955 |
oclc_num | 1144893165 |
open_access_boolean | |
owner | DE-92 DE-706 |
owner_facet | DE-92 DE-706 |
physical | 1 Online-Ressource (vi, 139 pages) |
psigel | ZDB-191-BEX |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Business Expert Press |
record_format | marc |
series2 | Business law and corporate risk management collection |
spelling | Addo, Archie Verfasser aut Artificial intelligence for security Archie Addo, Srini Centhala, and Muthu Shanmugam First edition New York, New York (222 East 46th Street, New York, NY 10017) Business Expert Press 2020 1 Online-Ressource (vi, 139 pages) txt rdacontent c rdamedia cr rdacarrier Business law and corporate risk management collection Includes bibliographical references (pages 129-132) and index Chapter 1. Introduction -- Chapter 2. Introduction to security -- Chapter 3. How AI and security come together? -- Chapter 4. Knowledgebase -- Chapter 5. AI solutions for security -- Chapter 6. Industry domain -- Chapter 7. Conclusion Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment Artificial intelligence Management information systems Business intelligence Computersicherheit (DE-588)4274324-2 gnd rswk-swf Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Electronic books Künstliche Intelligenz (DE-588)4033447-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Centhala, Srini aut Shanmugam, Muthu aut Erscheint auch als Druck-Ausgabe 9781951527266 https://portal.igpublish.com/iglibrary/search/BEPB0000965.html Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Addo, Archie Centhala, Srini Shanmugam, Muthu Artificial intelligence for security Artificial intelligence Management information systems Business intelligence Computersicherheit (DE-588)4274324-2 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033447-8 |
title | Artificial intelligence for security |
title_auth | Artificial intelligence for security |
title_exact_search | Artificial intelligence for security |
title_exact_search_txtP | Artificial intelligence for security |
title_full | Artificial intelligence for security Archie Addo, Srini Centhala, and Muthu Shanmugam |
title_fullStr | Artificial intelligence for security Archie Addo, Srini Centhala, and Muthu Shanmugam |
title_full_unstemmed | Artificial intelligence for security Archie Addo, Srini Centhala, and Muthu Shanmugam |
title_short | Artificial intelligence for security |
title_sort | artificial intelligence for security |
topic | Artificial intelligence Management information systems Business intelligence Computersicherheit (DE-588)4274324-2 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd |
topic_facet | Artificial intelligence Management information systems Business intelligence Computersicherheit Künstliche Intelligenz |
url | https://portal.igpublish.com/iglibrary/search/BEPB0000965.html |
work_keys_str_mv | AT addoarchie artificialintelligenceforsecurity AT centhalasrini artificialintelligenceforsecurity AT shanmugammuthu artificialintelligenceforsecurity |