Cargando…

Secure because math? : challenges on applying machine learning to security /

"Large-scale machine learning, be it supervised or unsupervised, has become an important cornerstone of the information systems we use today. It is only natural that it would become a hot topic in Information Security as well, and a large number of security startups have appeared claiming mirac...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Pinto, Alex (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_ocn936179980
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 160128s2015 xx 061 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCO  |d OCLCF  |d OCLCO 
029 1 |a AU@  |b 000067115883 
035 |a (OCoLC)936179980 
037 |a CL0500000709  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Pinto, Alex,  |e speaker. 
245 1 0 |a Secure because math? :  |b challenges on applying machine learning to security /  |c with Alex Pinto. 
246 3 0 |a Challenges on applying machine learning to security 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media,  |c [2015] 
300 |a 1 online resource (1 streaming video file (1 hr., 24 sec.)) :  |b digital, sound, color 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from title screen (viewed January 28, 2016). 
511 0 |a Presenter, Alex Pinto. 
520 |a "Large-scale machine learning, be it supervised or unsupervised, has become an important cornerstone of the information systems we use today. It is only natural that it would become a hot topic in Information Security as well, and a large number of security startups have appeared claiming miracles due to their experience with big data technologies even without previous experience in the Information Security field. It turns out not all algorithms and techniques are born equal, and protecting networks and endpoints from attackers is a very different problem then recommendation engines and automated ad bidding. Not to speak of the potentially disastrous results if techniques are applied incorrectly or with a bad sensitivity/specificity calibration.This presentation will describe how information security is a different problem and the challenges intrinsic to this specific field that many first entrants seem to ignore. We will discuss strengths and caveats of unsupervised and supervised models in this scenario and where they have historically been applied in different segments of InfoSec. It will provide all the background in Information Security you may need to enjoy it, and will shed some light on burning questions about "why isn't this all secure with deep learning already?" and "if I can decide to bid on an ad in milliseconds, why can't I use this tech to block an attacker?."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Machine learning. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Apprentissage automatique. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
650 7 |a Machine learning.  |2 fast  |0 (OCoLC)fst01004795 
856 4 0 |u https://learning.oreilly.com/videos/~/9781491954850/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP