Cargando…

Machine Learning for Cybersecurity Cookbook : Over 80 Recipes on How to Implement Machine Learning Algorithms for Building Security Systems Using Python.

This book helps data scientists and cybersecurity experts on implementing the latest AI techniques in cybersecurity. Concrete and clear steps for implementing ML security systems are provided, saving you months in research and development. By the end of this book, you will be able to build defensive...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Tsukerman, Emmanuel
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2019.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBSCO_on1129196943
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 191221s2019 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d TEFOD  |d EBLCP  |d TEFOD  |d OCLCF  |d OCLCQ  |d N$T  |d NLW  |d OCLCO  |d NZAUC  |d OCLCQ  |d OCLCO 
020 |a 1838556346 
020 |a 9781838556341  |q (electronic bk.) 
035 |a (OCoLC)1129196943 
037 |a 72EE5937-3927-4CA9-8C56-16FD64DE1D71  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Tsukerman, Emmanuel. 
245 1 0 |a Machine Learning for Cybersecurity Cookbook :  |b Over 80 Recipes on How to Implement Machine Learning Algorithms for Building Security Systems Using Python. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2019. 
300 |a 1 online resource (338 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 1: Machine Learning for Cybersecurity -- Technical requirements -- Train-test-splitting your data -- Getting ready -- How to do it ... -- How it works ... -- Standardizing your data -- Getting ready -- How to do it ... -- How it works ... -- Summarizing large data using principal component analysis -- Getting ready -- How to do it ... -- How it works ... -- Generating text using Markov chains -- Getting ready -- How to do it ... -- How it works ... 
505 8 |a Performing clustering using scikit-learn -- Getting ready -- How to do it ... -- How it works ... -- Training an XGBoost classifier -- Getting ready -- How to do it ... -- How it works ... -- Analyzing time series using statsmodels -- Getting ready -- How to do it ... -- How it works ... -- Anomaly detection with Isolation Forest -- Getting ready -- How to do it ... -- How it works ... -- Natural language processing using a hashing vectorizer and tf-idf with scikit-learn -- Getting ready -- How to do it ... -- How it works ... -- Hyperparameter tuning with scikit-optimize -- Getting ready -- How to do it ... 
505 8 |a How it works ... -- Chapter 2: Machine Learning-Based Malware Detection -- Technical requirements -- Malware static analysis -- Computing the hash of a sample -- Getting ready -- How to do it ... -- How it works ... -- YARA -- Getting ready -- How to do it ... -- How it works ... -- Examining the PE header -- Getting ready -- How to do it ... -- How it works ... -- Featurizing the PE header -- Getting ready -- How to do it ... -- How it works ... -- Malware dynamic analysis -- Getting ready -- How to do it ... -- How it works ... -- Using machine learning to detect the file type 
505 8 |a Scraping GitHub for files of a specific type -- Getting ready -- How to do it ... -- How it works ... -- Classifying files by type -- Getting ready -- How to do it ... -- How it works ... -- Measuring the similarity between two strings -- Getting ready -- How to do it ... -- How it works ... -- Measuring the similarity between two files -- Getting ready -- How to do it ... -- How it works ... -- Extracting N-grams -- Getting ready -- How to do it ... -- How it works ... -- Selecting the best N-grams -- Getting ready -- How to do it ... -- How it works ... -- Building a static malware detector -- Getting ready 
505 8 |a How to do it ... -- How it works ... -- Tackling class imbalance -- Getting ready -- How to do it ... -- How it works ... -- Handling type I and type II errors -- Getting ready -- How to do it ... -- How it works ... -- Chapter 3: Advanced Malware Detection -- Technical requirements -- Detecting obfuscated JavaScript -- Getting ready -- How to do it ... -- How it works ... -- Featurizing PDF files -- Getting ready -- How to do it ... -- How it works ... -- Extracting N-grams quickly using the hash-gram algorithm -- Getting ready -- How to do it ... -- How it works ... -- See also -- Building a dynamic malware classifier 
500 |a Getting ready 
520 |a This book helps data scientists and cybersecurity experts on implementing the latest AI techniques in cybersecurity. Concrete and clear steps for implementing ML security systems are provided, saving you months in research and development. By the end of this book, you will be able to build defensive systems to curb cybersecurity threats. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Machine learning. 
650 2 |a Computer Security 
650 2 |a Machine Learning 
650 6 |a Sécurité informatique. 
650 6 |a Apprentissage automatique. 
650 7 |a Artificial intelligence.  |2 bicssc 
650 7 |a Expert systems / knowledge-based systems.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a Computers  |x Intelligence (AI) & Semantics.  |2 bisacsh 
650 7 |a Computers  |x Expert Systems.  |2 bisacsh 
650 7 |a Computers  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Machine learning  |2 fast 
776 0 8 |i Print version:  |a Tsukerman, Emmanuel.  |t Machine Learning for Cybersecurity Cookbook : Over 80 Recipes on How to Implement Machine Learning Algorithms for Building Security Systems Using Python.  |d Birmingham : Packt Publishing, Limited, ©2019  |z 9781789614671 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2318877  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5986294 
938 |a EBSCOhost  |b EBSC  |n 2318877 
994 |a 92  |b IZTAP