Intelligent security systems: how artificial intelligence, machine learning and data science work for and against computer security
"Intelligent Security Systems expertly combines artificial intelligence, machine learning techniques and computer security systems. This book uniquely concentrates on the design features of computer security tools and mechanisms, discussing how artificial intelligence (AI) and machine learning...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Piscataway, NJ
IEEE Press
[2022]
Hoboken, NJ Wiley |
Schlagworte: | |
Online-Zugang: | FHI01 Volltext |
Zusammenfassung: | "Intelligent Security Systems expertly combines artificial intelligence, machine learning techniques and computer security systems. This book uniquely concentrates on the design features of computer security tools and mechanisms, discussing how artificial intelligence (AI) and machine learning (ML) techniques are employed in industrial practice. The author -a noted expert on the topic - starts with an explanation of the basic concepts and terminology before going on to help the reader develop knowledge and practical skills on additional topics such as firewalls and malware detection, analyzing their design and functions within computer security, and delving deeper into the small aspects that make up the final security system. Aimed at undergraduate and graduate students, this book is built up of 5 modules, with each module allowing the reader to gain a deeper understanding of the many applications that are used to create expert computer systems. This book will support readers as they adapt their knowledge in intelligent security systems."-- |
Beschreibung: | 1 Online-Ressource (337 Seiten) Illustrationen, Diagramme |
ISBN: | 9781119771579 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048518664 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 221018s2022 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781119771579 |c hardback |9 978-1-119-77157-9 | ||
024 | 7 | |a 10.1002/9781119771579 |2 doi | |
035 | |a (OCoLC)1349539218 | ||
035 | |a (DE-599)BVBBV048518664 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-573 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Reznik, Leonid |d 1955- |e Verfasser |0 (DE-588)1146069510 |4 aut | |
245 | 1 | 0 | |a Intelligent security systems |b how artificial intelligence, machine learning and data science work for and against computer security |c Leon Reznik |
264 | 1 | |a Piscataway, NJ |b IEEE Press |c [2022] | |
264 | 1 | |a Hoboken, NJ |b Wiley | |
300 | |a 1 Online-Ressource (337 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a "Intelligent Security Systems expertly combines artificial intelligence, machine learning techniques and computer security systems. This book uniquely concentrates on the design features of computer security tools and mechanisms, discussing how artificial intelligence (AI) and machine learning (ML) techniques are employed in industrial practice. The author -a noted expert on the topic - starts with an explanation of the basic concepts and terminology before going on to help the reader develop knowledge and practical skills on additional topics such as firewalls and malware detection, analyzing their design and functions within computer security, and delving deeper into the small aspects that make up the final security system. Aimed at undergraduate and graduate students, this book is built up of 5 modules, with each module allowing the reader to gain a deeper understanding of the many applications that are used to create expert computer systems. This book will support readers as they adapt their knowledge in intelligent security systems."-- | |
653 | 0 | |a Computer security | |
653 | 0 | |a Artificial intelligence | |
653 | 0 | |a Machine learning | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-119-77153-1 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033895589 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579 |l FHI01 |p ZDB-35-WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184503209426944 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Reznik, Leonid 1955- |
author_GND | (DE-588)1146069510 |
author_facet | Reznik, Leonid 1955- |
author_role | aut |
author_sort | Reznik, Leonid 1955- |
author_variant | l r lr |
building | Verbundindex |
bvnumber | BV048518664 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-35-WIC |
ctrlnum | (OCoLC)1349539218 (DE-599)BVBBV048518664 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02565nmm a2200409 c 4500</leader><controlfield tag="001">BV048518664</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">221018s2022 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119771579</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-119-77157-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119771579</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1349539218</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048518664</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Reznik, Leonid</subfield><subfield code="d">1955-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1146069510</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligent security systems</subfield><subfield code="b">how artificial intelligence, machine learning and data science work for and against computer security</subfield><subfield code="c">Leon Reznik</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Piscataway, NJ</subfield><subfield code="b">IEEE Press</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (337 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Intelligent Security Systems expertly combines artificial intelligence, machine learning techniques and computer security systems. This book uniquely concentrates on the design features of computer security tools and mechanisms, discussing how artificial intelligence (AI) and machine learning (ML) techniques are employed in industrial practice. The author -a noted expert on the topic - starts with an explanation of the basic concepts and terminology before going on to help the reader develop knowledge and practical skills on additional topics such as firewalls and malware detection, analyzing their design and functions within computer security, and delving deeper into the small aspects that make up the final security system. Aimed at undergraduate and graduate students, this book is built up of 5 modules, with each module allowing the reader to gain a deeper understanding of the many applications that are used to create expert computer systems. This book will support readers as they adapt their knowledge in intelligent security systems."--</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Machine learning</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-119-77153-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033895589</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048518664 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:49:14Z |
indexdate | 2024-07-10T09:40:22Z |
institution | BVB |
isbn | 9781119771579 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033895589 |
oclc_num | 1349539218 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | 1 Online-Ressource (337 Seiten) Illustrationen, Diagramme |
psigel | ZDB-35-WIC |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IEEE Press Wiley |
record_format | marc |
spelling | Reznik, Leonid 1955- Verfasser (DE-588)1146069510 aut Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security Leon Reznik Piscataway, NJ IEEE Press [2022] Hoboken, NJ Wiley 1 Online-Ressource (337 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier "Intelligent Security Systems expertly combines artificial intelligence, machine learning techniques and computer security systems. This book uniquely concentrates on the design features of computer security tools and mechanisms, discussing how artificial intelligence (AI) and machine learning (ML) techniques are employed in industrial practice. The author -a noted expert on the topic - starts with an explanation of the basic concepts and terminology before going on to help the reader develop knowledge and practical skills on additional topics such as firewalls and malware detection, analyzing their design and functions within computer security, and delving deeper into the small aspects that make up the final security system. Aimed at undergraduate and graduate students, this book is built up of 5 modules, with each module allowing the reader to gain a deeper understanding of the many applications that are used to create expert computer systems. This book will support readers as they adapt their knowledge in intelligent security systems."-- Computer security Artificial intelligence Machine learning Erscheint auch als Druck-Ausgabe 978-1-119-77153-1 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Reznik, Leonid 1955- Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security |
title | Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security |
title_auth | Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security |
title_exact_search | Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security |
title_exact_search_txtP | Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security |
title_full | Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security Leon Reznik |
title_fullStr | Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security Leon Reznik |
title_full_unstemmed | Intelligent security systems how artificial intelligence, machine learning and data science work for and against computer security Leon Reznik |
title_short | Intelligent security systems |
title_sort | intelligent security systems how artificial intelligence machine learning and data science work for and against computer security |
title_sub | how artificial intelligence, machine learning and data science work for and against computer security |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579 |
work_keys_str_mv | AT reznikleonid intelligentsecuritysystemshowartificialintelligencemachinelearninganddatascienceworkforandagainstcomputersecurity |