|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1348104631 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
221018s2018 xx 055 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d UMI
|d OCLCO
|
019 |
|
|
|a 1035765595
|a 1362788452
|
020 |
|
|
|a 9781492032373
|q (electronic video)
|
020 |
|
|
|a 1492032379
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000073549397
|
035 |
|
|
|a (OCoLC)1348104631
|z (OCoLC)1035765595
|z (OCoLC)1362788452
|
037 |
|
|
|a 9781492032373
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20221018
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Unsupervised machine learning in security applications.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c [2018]
|
300 |
|
|
|a 1 online resource (1 video file (55 min.)) :
|b sound, color.
|
306 |
|
|
|a 005500
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Charles Givre, presenter.
|
520 |
|
|
|a What is this video course about, and why is it important? Today, arguably the most important field in the IT industry is security. With more and more commerce and business being conducted online every day, keeping data safe by detecting and repelling attacks is paramount to every organization. One area that shows great potential in the battle against hackers and their exploits is machine learning. Unleashing the increasing power and finesse of these systems toward defeating intrusions and data theft is no longer a theoretical pursuit. Indeed, machine learning is being used to defend systems and networks across an increasing range of industries and enterprises, so it's no mystery that there's also an increasing demand for skilled and qualified security specialists who can apply data science techniques to the task of data security. This video course introduces you to the concept "unsupervised" model training, or learning, in a security context. Your host, cyber security specialist and data scientist Charles Givre, explains the theory behind commonly used clustering algorithms such as K-means and DBSCAN as well as the direct application to security problems such as anomaly detection. You'll see how to pipeline your models into a production environment using the Python scikit-learning library. You'll also learn how to calculate metrics to assess your models' performance, and how to use Yellowbrick to create visualizations of those performance evaluations. This video course is one in a set of three individual ones intended for security professionals who want to learn how to use and apply data science to their toughest security problems. Mr. Givre focuses on the tools and techniques that are directly applicable to the industry, and uses security problems and datasets to walk you through the entire data science process from end-to-end. What you'll learn--and how you can apply it The mechanics of several commonly used clustering algorithms such as K-means and DBSCAN How to reduce the dimensions of large datasets using Principal Component Analysis Understanding how to evaluate the performance of unsupervised techniques when possible Using Yellowbrick to produce visualizations of performance evaluations Applying unsupervised learning techniques to security problems such as detecting anomalies This video course is for you because... You're a security professional with some scripting skills and you want to apply data science techniques to your work to analyze data more efficiently You're a network analyst with some scripting skills and you want to use machine learning techniques to better secure your network Prerequisites: You should have beginner- to intermediate-level experience with the Python programming language You should be familiar with security and networking concepts You should be generally familiar with basic statistical concepts Materials or downloads needed in advance: Students are encouraged to use the Griffon Virtual Machine for Data Science, which is available at https://github.com/gtkcyber/griffon-vm. (Griffon is a virtual machine with all data sources and all tools preconfigured) Students should have access to a computer with at least 8 GB of RAM and 20 to 30 GB of hard drive space.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Machine learning.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Apprentissage automatique.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Machine learning
|2 fast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Givre, Charles,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781492032373/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|