Hands-on artificial intelligence for cybersecurity :: implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies /
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2019.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets. |
Beschreibung: | A Bayesian spam detector with NLTK |
Beschreibung: | 1 online resource (331 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1789805171 9781789805178 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1111967955 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 190831t20192019enk ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d TEFOD |d EBLCP |d TEFOD |d UKMGB |d OCLCF |d OCLCQ |d YDXIT |d N$T |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d OCLCO |d OCLCL |d SXB | ||
015 | |a GBB9E0694 |2 bnb | ||
016 | 7 | |a 019505050 |2 Uk | |
020 | |a 1789805171 |q (electronic book) | ||
020 | |a 9781789805178 |q (electronic bk.) | ||
020 | |z 9781789804027 |q (paperback) | ||
035 | |a (OCoLC)1111967955 | ||
037 | |a 97E3FDBA-B164-48F1-95C9-49F8226F3F2C |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b P37 2019 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Parisi, Alessandro, |e author. | |
245 | 1 | 0 | |a Hands-on artificial intelligence for cybersecurity : |b implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / |c Alessandro Parisi. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2019. | |
264 | 4 | |c ©2019 | |
300 | |a 1 online resource (331 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization | |
505 | 8 | |a How to find useful sources of dataQuantity versus quality; Getting to know Python's libraries; Supervised learning example -- linear regression; Unsupervised learning example -- clustering; Simple NN example -- perceptron; AI in the context of cybersecurity; Summary; Chapter 2: Setting Up Your AI for Cybersecurity Arsenal; Getting to know Python for AI and cybersecurity; Python libraries for AI; NumPy as an AI building block; NumPy multidimensional arrays; Matrix operations with NumPy; Implementing a simple predictor with NumPy; Scikit-learn; Matplotlib and Seaborn; Pandas | |
505 | 8 | |a Python libraries for cybersecurityPefile; Volatility; Installing Python libraries; Enter Anaconda -- the data scientist's environment of choice; Anaconda Python advantages; Conda utility; Installing packages in Anaconda; Creating custom environments; Some useful Conda commands; Python on steroids with parallel GPU; Playing with Jupyter Notebooks; Our first Jupyter Notebook; Exploring the Jupyter interface; What's in a cell?; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras | |
505 | 8 | |a PyTorchPyTorch versus TensorFlow; Summary; Section 2: Detecting Cybersecurity Threats with AI; Chapter 3: Ham or Spam? Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Meet NNs at their purest -- the Perceptron; It's all about finding the right weight!; Spam filters in a nutshell; Spam filters in action; Detecting spam with linear classifiers; How the Perceptron learns; A simple Perceptron-based spam filter; Pros and cons of Perceptrons; Spam detection with SVMs; SVM optimization strategy; SVM spam filter example; Image spam detection with SVMs | |
505 | 8 | |a How did SVM come into existence?Phishing detection with logistic regression and decision trees; Regression models; Introducing linear regression models; Linear regression with scikit-learn; Linear regression -- pros and cons; Logistic regression; A phishing detector with logistic regression; Logistic regression pros and cons; Making decisions with trees; Decision trees rationales; Phishing detection with decision trees; Decision trees -- pros and cons; Spam detection with Naive Bayes; Advantages of Naive Bayes for spam detection; Why Naive Bayes?; NLP to the rescue; NLP steps | |
500 | |a A Bayesian spam detector with NLTK | ||
520 | |a If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets. | ||
588 | 0 | |a Online resource; title from digital title page (viewed on December 27, 2019). | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Machine learning. |0 http://id.loc.gov/authorities/subjects/sh85079324 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Apprentissage automatique. | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Machine learning |2 fast | |
655 | 4 | |a Electronic book. | |
758 | |i has work: |a Hands-On Artificial Intelligence for Cybersecurity (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3hjHPJKrprGKRBJg7jBRq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Parisi, Alessandro. |t Hands-On Artificial Intelligence for Cybersecurity : Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. |d Birmingham : Packt Publishing, Limited, ©2019 |z 9781789804027 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2225815 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL5847212 | ||
938 | |a EBSCOhost |b EBSC |n 2225815 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1111967955 |
---|---|
_version_ | 1816882498273017856 |
adam_text | |
any_adam_object | |
author | Parisi, Alessandro |
author_facet | Parisi, Alessandro |
author_role | aut |
author_sort | Parisi, Alessandro |
author_variant | a p ap |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 P37 2019 |
callnumber-search | QA76.9.A25 P37 2019 |
callnumber-sort | QA 276.9 A25 P37 42019 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization How to find useful sources of dataQuantity versus quality; Getting to know Python's libraries; Supervised learning example -- linear regression; Unsupervised learning example -- clustering; Simple NN example -- perceptron; AI in the context of cybersecurity; Summary; Chapter 2: Setting Up Your AI for Cybersecurity Arsenal; Getting to know Python for AI and cybersecurity; Python libraries for AI; NumPy as an AI building block; NumPy multidimensional arrays; Matrix operations with NumPy; Implementing a simple predictor with NumPy; Scikit-learn; Matplotlib and Seaborn; Pandas Python libraries for cybersecurityPefile; Volatility; Installing Python libraries; Enter Anaconda -- the data scientist's environment of choice; Anaconda Python advantages; Conda utility; Installing packages in Anaconda; Creating custom environments; Some useful Conda commands; Python on steroids with parallel GPU; Playing with Jupyter Notebooks; Our first Jupyter Notebook; Exploring the Jupyter interface; What's in a cell?; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras PyTorchPyTorch versus TensorFlow; Summary; Section 2: Detecting Cybersecurity Threats with AI; Chapter 3: Ham or Spam? Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Meet NNs at their purest -- the Perceptron; It's all about finding the right weight!; Spam filters in a nutshell; Spam filters in action; Detecting spam with linear classifiers; How the Perceptron learns; A simple Perceptron-based spam filter; Pros and cons of Perceptrons; Spam detection with SVMs; SVM optimization strategy; SVM spam filter example; Image spam detection with SVMs How did SVM come into existence?Phishing detection with logistic regression and decision trees; Regression models; Introducing linear regression models; Linear regression with scikit-learn; Linear regression -- pros and cons; Logistic regression; A phishing detector with logistic regression; Logistic regression pros and cons; Making decisions with trees; Decision trees rationales; Phishing detection with decision trees; Decision trees -- pros and cons; Spam detection with Naive Bayes; Advantages of Naive Bayes for spam detection; Why Naive Bayes?; NLP to the rescue; NLP steps |
ctrlnum | (OCoLC)1111967955 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05858cam a2200589 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1111967955</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">190831t20192019enk ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">EBLCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXIT</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB9E0694</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019505050</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789805171</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789805178</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781789804027</subfield><subfield code="q">(paperback)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1111967955</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">97E3FDBA-B164-48F1-95C9-49F8226F3F2C</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">P37 2019</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Parisi, Alessandro,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hands-on artificial intelligence for cybersecurity :</subfield><subfield code="b">implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies /</subfield><subfield code="c">Alessandro Parisi.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (331 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">How to find useful sources of dataQuantity versus quality; Getting to know Python's libraries; Supervised learning example -- linear regression; Unsupervised learning example -- clustering; Simple NN example -- perceptron; AI in the context of cybersecurity; Summary; Chapter 2: Setting Up Your AI for Cybersecurity Arsenal; Getting to know Python for AI and cybersecurity; Python libraries for AI; NumPy as an AI building block; NumPy multidimensional arrays; Matrix operations with NumPy; Implementing a simple predictor with NumPy; Scikit-learn; Matplotlib and Seaborn; Pandas</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Python libraries for cybersecurityPefile; Volatility; Installing Python libraries; Enter Anaconda -- the data scientist's environment of choice; Anaconda Python advantages; Conda utility; Installing packages in Anaconda; Creating custom environments; Some useful Conda commands; Python on steroids with parallel GPU; Playing with Jupyter Notebooks; Our first Jupyter Notebook; Exploring the Jupyter interface; What's in a cell?; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">PyTorchPyTorch versus TensorFlow; Summary; Section 2: Detecting Cybersecurity Threats with AI; Chapter 3: Ham or Spam? Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Meet NNs at their purest -- the Perceptron; It's all about finding the right weight!; Spam filters in a nutshell; Spam filters in action; Detecting spam with linear classifiers; How the Perceptron learns; A simple Perceptron-based spam filter; Pros and cons of Perceptrons; Spam detection with SVMs; SVM optimization strategy; SVM spam filter example; Image spam detection with SVMs</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">How did SVM come into existence?Phishing detection with logistic regression and decision trees; Regression models; Introducing linear regression models; Linear regression with scikit-learn; Linear regression -- pros and cons; Logistic regression; A phishing detector with logistic regression; Logistic regression pros and cons; Making decisions with trees; Decision trees rationales; Phishing detection with decision trees; Decision trees -- pros and cons; Spam detection with Naive Bayes; Advantages of Naive Bayes for spam detection; Why Naive Bayes?; NLP to the rescue; NLP steps</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">A Bayesian spam detector with NLTK</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on December 27, 2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Machine learning.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85079324</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Apprentissage automatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Machine learning</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Hands-On Artificial Intelligence for Cybersecurity (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3hjHPJKrprGKRBJg7jBRq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Parisi, Alessandro.</subfield><subfield code="t">Hands-On Artificial Intelligence for Cybersecurity : Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2019</subfield><subfield code="z">9781789804027</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2225815</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5847212</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2225815</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-on1111967955 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:34Z |
institution | BVB |
isbn | 1789805171 9781789805178 |
language | English |
oclc_num | 1111967955 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (331 pages) |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Parisi, Alessandro, author. Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / Alessandro Parisi. Birmingham, UK : Packt Publishing, 2019. ©2019 1 online resource (331 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization How to find useful sources of dataQuantity versus quality; Getting to know Python's libraries; Supervised learning example -- linear regression; Unsupervised learning example -- clustering; Simple NN example -- perceptron; AI in the context of cybersecurity; Summary; Chapter 2: Setting Up Your AI for Cybersecurity Arsenal; Getting to know Python for AI and cybersecurity; Python libraries for AI; NumPy as an AI building block; NumPy multidimensional arrays; Matrix operations with NumPy; Implementing a simple predictor with NumPy; Scikit-learn; Matplotlib and Seaborn; Pandas Python libraries for cybersecurityPefile; Volatility; Installing Python libraries; Enter Anaconda -- the data scientist's environment of choice; Anaconda Python advantages; Conda utility; Installing packages in Anaconda; Creating custom environments; Some useful Conda commands; Python on steroids with parallel GPU; Playing with Jupyter Notebooks; Our first Jupyter Notebook; Exploring the Jupyter interface; What's in a cell?; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras PyTorchPyTorch versus TensorFlow; Summary; Section 2: Detecting Cybersecurity Threats with AI; Chapter 3: Ham or Spam? Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Meet NNs at their purest -- the Perceptron; It's all about finding the right weight!; Spam filters in a nutshell; Spam filters in action; Detecting spam with linear classifiers; How the Perceptron learns; A simple Perceptron-based spam filter; Pros and cons of Perceptrons; Spam detection with SVMs; SVM optimization strategy; SVM spam filter example; Image spam detection with SVMs How did SVM come into existence?Phishing detection with logistic regression and decision trees; Regression models; Introducing linear regression models; Linear regression with scikit-learn; Linear regression -- pros and cons; Logistic regression; A phishing detector with logistic regression; Logistic regression pros and cons; Making decisions with trees; Decision trees rationales; Phishing detection with decision trees; Decision trees -- pros and cons; Spam detection with Naive Bayes; Advantages of Naive Bayes for spam detection; Why Naive Bayes?; NLP to the rescue; NLP steps A Bayesian spam detector with NLTK If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets. Online resource; title from digital title page (viewed on December 27, 2019). Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Machine learning. http://id.loc.gov/authorities/subjects/sh85079324 Sécurité informatique. Apprentissage automatique. Computer security fast Machine learning fast Electronic book. has work: Hands-On Artificial Intelligence for Cybersecurity (Text) https://id.oclc.org/worldcat/entity/E39PD3hjHPJKrprGKRBJg7jBRq https://id.oclc.org/worldcat/ontology/hasWork Print version: Parisi, Alessandro. Hands-On Artificial Intelligence for Cybersecurity : Implement Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network Anomalies. Birmingham : Packt Publishing, Limited, ©2019 9781789804027 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2225815 Volltext |
spellingShingle | Parisi, Alessandro Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: AI Core Concepts and Tools of the Trade; Chapter 1: Introduction to AI for Cybersecurity Professionals; Applying AI in cybersecurity; Evolution in AI: from expert systems to data mining; A brief introduction to expert systems; Reflecting the indeterministic nature of reality; Going beyond statistics toward machine learning; Mining data for models; Types of machine learning; Supervised learning; Unsupervised learning; Reinforcement learning; Algorithm training and optimization How to find useful sources of dataQuantity versus quality; Getting to know Python's libraries; Supervised learning example -- linear regression; Unsupervised learning example -- clustering; Simple NN example -- perceptron; AI in the context of cybersecurity; Summary; Chapter 2: Setting Up Your AI for Cybersecurity Arsenal; Getting to know Python for AI and cybersecurity; Python libraries for AI; NumPy as an AI building block; NumPy multidimensional arrays; Matrix operations with NumPy; Implementing a simple predictor with NumPy; Scikit-learn; Matplotlib and Seaborn; Pandas Python libraries for cybersecurityPefile; Volatility; Installing Python libraries; Enter Anaconda -- the data scientist's environment of choice; Anaconda Python advantages; Conda utility; Installing packages in Anaconda; Creating custom environments; Some useful Conda commands; Python on steroids with parallel GPU; Playing with Jupyter Notebooks; Our first Jupyter Notebook; Exploring the Jupyter interface; What's in a cell?; Useful keyboard shortcuts; Choose your notebook kernel; Getting your hands dirty; Installing DL libraries; Deep learning pros and cons for cybersecurity; TensorFlow; Keras PyTorchPyTorch versus TensorFlow; Summary; Section 2: Detecting Cybersecurity Threats with AI; Chapter 3: Ham or Spam? Detecting Email Cybersecurity Threats with AI; Detecting spam with Perceptrons; Meet NNs at their purest -- the Perceptron; It's all about finding the right weight!; Spam filters in a nutshell; Spam filters in action; Detecting spam with linear classifiers; How the Perceptron learns; A simple Perceptron-based spam filter; Pros and cons of Perceptrons; Spam detection with SVMs; SVM optimization strategy; SVM spam filter example; Image spam detection with SVMs How did SVM come into existence?Phishing detection with logistic regression and decision trees; Regression models; Introducing linear regression models; Linear regression with scikit-learn; Linear regression -- pros and cons; Logistic regression; A phishing detector with logistic regression; Logistic regression pros and cons; Making decisions with trees; Decision trees rationales; Phishing detection with decision trees; Decision trees -- pros and cons; Spam detection with Naive Bayes; Advantages of Naive Bayes for spam detection; Why Naive Bayes?; NLP to the rescue; NLP steps Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Machine learning. http://id.loc.gov/authorities/subjects/sh85079324 Sécurité informatique. Apprentissage automatique. Computer security fast Machine learning fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh85079324 |
title | Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / |
title_auth | Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / |
title_exact_search | Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / |
title_full | Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / Alessandro Parisi. |
title_fullStr | Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / Alessandro Parisi. |
title_full_unstemmed | Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / Alessandro Parisi. |
title_short | Hands-on artificial intelligence for cybersecurity : |
title_sort | hands on artificial intelligence for cybersecurity implement smart ai systems for preventing cyber attacks and detecting threats and network anomalies |
title_sub | implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies / |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Machine learning. http://id.loc.gov/authorities/subjects/sh85079324 Sécurité informatique. Apprentissage automatique. Computer security fast Machine learning fast |
topic_facet | Computer security. Machine learning. Sécurité informatique. Apprentissage automatique. Computer security Machine learning Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2225815 |
work_keys_str_mv | AT parisialessandro handsonartificialintelligenceforcybersecurityimplementsmartaisystemsforpreventingcyberattacksanddetectingthreatsandnetworkanomalies |