Artificial intelligence for security:
Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are eva...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Business Expert Press
2020
|
Ausgabe: | First edition |
Schriftenreihe: | Business law and corporate risk management collection
|
Schlagworte: | |
Zusammenfassung: | Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | ix, 139 pages Illustrationen, Diagramme |
ISBN: | 9781951527266 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049298851 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 230825s2020 a||| |||| 00||| eng d | ||
020 | |a 9781951527266 |9 978-1-951527-26-6 | ||
035 | |a (OCoLC)1401195175 | ||
035 | |a (DE-599)HBZHT020530017 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Addo, Archie |e Verfasser |4 aut | |
245 | 1 | 0 | |a Artificial intelligence for security |c Archie Addo, Srini Centhala, and Muthu Shanmugam |
250 | |a First edition | ||
264 | 1 | |a New York, NY |b Business Expert Press |c 2020 | |
300 | |a ix, 139 pages |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Business law and corporate risk management collection | |
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment. | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
653 | 0 | |a Artificial intelligence | |
653 | 0 | |a Management information systems | |
653 | 0 | |a Business intelligence | |
653 | 0 | |a Project management | |
653 | 0 | |a Construction management | |
653 | 0 | |a Program management | |
653 | 0 | |a Skills development | |
653 | 0 | |a Security | |
653 | 0 | |a Artificial intelligence | |
653 | 0 | |a Analytics | |
653 | 0 | |a ML | |
653 | 0 | |a Mitigation | |
653 | 0 | |a Performance review | |
653 | 0 | |a Data science, and business intelligence | |
689 | 0 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Centhala, Srini |e Verfasser |4 aut | |
700 | 1 | |a Shanmugam, Muthu |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-951527-27-3 |
999 | |a oai:aleph.bib-bvb.de:BVB01-034560134 |
Datensatz im Suchindex
_version_ | 1804185793340637184 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Addo, Archie Centhala, Srini Shanmugam, Muthu |
author_facet | Addo, Archie Centhala, Srini Shanmugam, Muthu |
author_role | aut aut aut |
author_sort | Addo, Archie |
author_variant | a a aa s c sc m s ms |
building | Verbundindex |
bvnumber | BV049298851 |
classification_rvk | ST 300 ST 276 |
ctrlnum | (OCoLC)1401195175 (DE-599)HBZHT020530017 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02744nam a2200589 c 4500</leader><controlfield tag="001">BV049298851</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">230825s2020 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781951527266</subfield><subfield code="9">978-1-951527-26-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1401195175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT020530017</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Addo, Archie</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial intelligence for security</subfield><subfield code="c">Archie Addo, Srini Centhala, and Muthu Shanmugam</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Business Expert Press</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">ix, 139 pages</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Business law and corporate risk management collection</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Management information systems</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Business intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Project management</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Construction management</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Program management</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Skills development</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Analytics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">ML</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Mitigation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Performance review</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data science, and business intelligence</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Centhala, Srini</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shanmugam, Muthu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-951527-27-3</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034560134</subfield></datafield></record></collection> |
id | DE-604.BV049298851 |
illustrated | Illustrated |
index_date | 2024-07-03T22:38:43Z |
indexdate | 2024-07-10T10:00:53Z |
institution | BVB |
isbn | 9781951527266 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034560134 |
oclc_num | 1401195175 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | ix, 139 pages Illustrationen, Diagramme |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Business Expert Press |
record_format | marc |
series2 | Business law and corporate risk management collection |
spelling | Addo, Archie Verfasser aut Artificial intelligence for security Archie Addo, Srini Centhala, and Muthu Shanmugam First edition New York, NY Business Expert Press 2020 ix, 139 pages Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Business law and corporate risk management collection Includes bibliographical references and index Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment. Computersicherheit (DE-588)4274324-2 gnd rswk-swf Künstliche Intelligenz (DE-588)4033447-8 gnd rswk-swf Artificial intelligence Management information systems Business intelligence Project management Construction management Program management Skills development Security Analytics ML Mitigation Performance review Data science, and business intelligence Künstliche Intelligenz (DE-588)4033447-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Centhala, Srini Verfasser aut Shanmugam, Muthu Verfasser aut Erscheint auch als Online-Ausgabe 978-1-951527-27-3 |
spellingShingle | Addo, Archie Centhala, Srini Shanmugam, Muthu Artificial intelligence for security Computersicherheit (DE-588)4274324-2 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033447-8 |
title | Artificial intelligence for security |
title_auth | Artificial intelligence for security |
title_exact_search | Artificial intelligence for security |
title_exact_search_txtP | Artificial intelligence for security |
title_full | Artificial intelligence for security Archie Addo, Srini Centhala, and Muthu Shanmugam |
title_fullStr | Artificial intelligence for security Archie Addo, Srini Centhala, and Muthu Shanmugam |
title_full_unstemmed | Artificial intelligence for security Archie Addo, Srini Centhala, and Muthu Shanmugam |
title_short | Artificial intelligence for security |
title_sort | artificial intelligence for security |
topic | Computersicherheit (DE-588)4274324-2 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd |
topic_facet | Computersicherheit Künstliche Intelligenz |
work_keys_str_mv | AT addoarchie artificialintelligenceforsecurity AT centhalasrini artificialintelligenceforsecurity AT shanmugammuthu artificialintelligenceforsecurity |