|
|
|
|
LEADER |
00000cgm a2200000Ii 4500 |
001 |
OR_ocn936179980 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
160128s2015 xx 061 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000067115883
|
035 |
|
|
|a (OCoLC)936179980
|
037 |
|
|
|a CL0500000709
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Pinto, Alex,
|e speaker.
|
245 |
1 |
0 |
|a Secure because math? :
|b challenges on applying machine learning to security /
|c with Alex Pinto.
|
246 |
3 |
0 |
|a Challenges on applying machine learning to security
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media,
|c [2015]
|
300 |
|
|
|a 1 online resource (1 streaming video file (1 hr., 24 sec.)) :
|b digital, sound, color
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from title screen (viewed January 28, 2016).
|
511 |
0 |
|
|a Presenter, Alex Pinto.
|
520 |
|
|
|a "Large-scale machine learning, be it supervised or unsupervised, has become an important cornerstone of the information systems we use today. It is only natural that it would become a hot topic in Information Security as well, and a large number of security startups have appeared claiming miracles due to their experience with big data technologies even without previous experience in the Information Security field. It turns out not all algorithms and techniques are born equal, and protecting networks and endpoints from attackers is a very different problem then recommendation engines and automated ad bidding. Not to speak of the potentially disastrous results if techniques are applied incorrectly or with a bad sensitivity/specificity calibration.This presentation will describe how information security is a different problem and the challenges intrinsic to this specific field that many first entrants seem to ignore. We will discuss strengths and caveats of unsupervised and supervised models in this scenario and where they have historically been applied in different segments of InfoSec. It will provide all the background in Information Security you may need to enjoy it, and will shed some light on burning questions about "why isn't this all secure with deep learning already?" and "if I can decide to bid on an ad in milliseconds, why can't I use this tech to block an attacker?."--Resource description page.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Machine learning.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Apprentissage automatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
650 |
|
7 |
|a Machine learning.
|2 fast
|0 (OCoLC)fst01004795
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781491954850/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|