Thwart hackers by preventing, detecting, and misdirecting attempted access before the hacker can obtain credentials, engage in fraud, dig in deep, modify data, corrupt users, and otherwise completely ruin your day.
Machine learning is the most important new technology for getting more out of data today. It can reveal patterns that aren't obvious, for example, but it requires data, lots of it. Data gathering isn't just about data. It affects users and requires the use of applications to clean, manipulate, and analyze the data. Obtaining data in an ethical manner is important because the very act behaving ethically reduces the security risk associated with data. However, hackers don't necessarily target users and their data. Perhaps they're interested in your organization's trade secrets or committing fraud. They might simply be interested in lurking in the background and committing mischief. So, just keeping your data secure as a means of protecting your machine learning investment isn't enough. You need to do more.
This book helps you get the big picture from a machine learning perspective using all the latest research available on methods that hackers use to break into your system. It's about the whole system, not just your application. You discover techniques that help you gather data ethically and keep it safe, while also preventing all sorts of illegal access method from even occurring. In fact, you use machine learning as a tool to keep hackers at bay and discover their true intent for your organization.
Data scientists and computer scientists who develop machine learning applications of any type including students will find this book helpful. Machine Learning and Security researchers and scientists that are involved in some type of theoretical activity that benefits from machine learning will benefit from this book. Having working knowledge of Python Programming is required to get the best from this book.
"synopsis" may belong to another edition of this title.
John Paul Mueller is a seasoned author and technical editor. He has writing in his blood, having produced 121 books and more than 600 articles to date. The topics range from networking to artificial intelligence and from database management to heads-down programming. Some of his current books include discussions of data science, machine learning, and algorithms. He also writes about computer languages such as C++, C#, and Python. His technical editing skills have helped more than 70 authors refine the content of their manuscripts. John has provided technical editing services to a variety of magazines, performed various kinds of consulting, and he writes certification exams.
Rod Stephens has been a software developer, consultant, instructor, and author. He has written more than 30 books and 250 magazine articles covering such topics as three-dimensional graphics, algorithms, database design, software engineering, interview puzzles, C#, and Visual Basic. Rod's popular C# Helper and VB Helper websites receive millions of hits per year and contain thousands of tips, tricks, and example programs for C# and Visual Basic developers.
"About this title" may belong to another edition of this title.
£ 3.05 shipping from Germany to United Kingdom
Destination, rates & speedsSeller: medimops, Berlin, Germany
Condition: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Seller Inventory # M01804618853-V
Quantity: 1 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 45351493-n
Quantity: Over 20 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781804618851_new
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781804618851
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 45351493
Quantity: Over 20 available
Seller: BGV Books LLC, Murray, KY, U.S.A.
Condition: New. Exact ISBN match. Immediate shipping. No funny business. Seller Inventory # 9781804618851
Quantity: 2 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781804618851
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand. Seller Inventory # 400012932
Quantity: 4 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9781804618851
Quantity: Over 20 available
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes 1.69. Book. Seller Inventory # BBS-9781804618851
Quantity: 5 available