الاستماع والقراءة

خطوة إلى عالم لا حدود له من القصص

  • اقرأ واستمع إلى ما تريده
  • أكثر من مليون عنوان
  • العناوين الحصرية + أصول القصة
  • 7 يوم تجربة مجانية، ثم 9.99$ يورو في الشهر
  • من السهل الإلغاء في أي وقت
جرب مجانا
Details page - Device banner - 894x1036
Cover for Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python

Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python

اللغة
الإنجليزية
الصيغة
تصنيف

كتب واقعية

Learn how to apply modern AI to create powerful cybersecurity solutions for malware, pentesting, social engineering, data privacy, and intrusion detection

Key Features

• Manage data of varying complexity to protect your system using the Python ecosystem

• Apply ML to pentesting, malware, data privacy, intrusion detection system(IDS) and social engineering

• Automate your daily workflow by addressing various security challenges using the recipes covered in the book

Book Description

Organizations today face a major threat in terms of cybersecurity, from malicious URLs to credential reuse, and having robust security systems can make all the difference. With this book, you'll learn how to use Python libraries such as TensorFlow and scikit-learn to implement the latest artificial intelligence (AI) techniques and handle challenges faced by cybersecurity researchers.

You'll begin by exploring various machine learning (ML) techniques and tips for setting up a secure lab environment. Next, you'll implement key ML algorithms such as clustering, gradient boosting, random forest, and XGBoost. The book will guide you through constructing classifiers and features for malware, which you'll train and test on real samples. As you progress, you'll build self-learning, reliant systems to handle cybersecurity tasks such as identifying malicious URLs, spam email detection, intrusion detection, network protection, and tracking user and process behavior. Later, you'll apply generative adversarial networks (GANs) and autoencoders to advanced security tasks. Finally, you'll delve into secure and private AI to protect the privacy rights of consumers using your ML models.

By the end of this book, you'll have the skills you need to tackle real-world problems faced in the cybersecurity domain using a recipe-based approach.

What you will learn

• Learn how to build malware classifiers to detect suspicious activities

• Apply ML to generate custom malware to pentest your security

• Use ML algorithms with complex datasets to implement cybersecurity concepts

• Create neural networks to identify fake videos and images

• Secure your organization from one of the most popular threats – insider threats

• Defend against zero-day threats by constructing an anomaly detection system

• Detect web vulnerabilities effectively by combining Metasploit and ML

• Understand how to train a model without exposing the training data

Who this book is for

This book is for cybersecurity professionals and security researchers who are looking to implement the latest machine learning techniques to boost computer security, and gain insights into securing an organization using red and blue team ML. This recipe-based book will also be useful for data scientists and machine learning developers who want to experiment with smart techniques in the cybersecurity domain. Working knowledge of Python programming and familiarity with cybersecurity fundamentals will help you get the most out of this book.

© 2019 Packt Publishing (كتاب إلكتروني): 9781838556341

تاريخ النشر

كتاب إلكتروني: 25 نوفمبر 2019

واستمتع آخرون أيضًا...

  1. A Country Doctor
    A Country Doctor Sarah Orne Jewett
    2.8
  2. PMP Pro: Transform Your Exam Success with Game-Changing Secrets: "Elevate your PMP exam results! Dive into transformative audio lessons for peak performance on test day."
    PMP Pro: Transform Your Exam Success with Game-Changing Secrets: "Elevate your PMP exam results! Dive into transformative audio lessons for peak performance on test day." Arden Blakewood
  3. Summary - I’m Still Here: Based On The Book By Austin Channing Brown
    Summary - I’m Still Here: Based On The Book By Austin Channing Brown Library Of Stories
    1
  4. Desconexión Digital: Meditaciones Guiadas para Calma y Claridad
    Desconexión Digital: Meditaciones Guiadas para Calma y Claridad Refeser
  5. Summary - Emotional Intelligence 2.0.: Based On The Book By Travis Bradberry And Jean Greaves
    Summary - Emotional Intelligence 2.0.: Based On The Book By Travis Bradberry And Jean Greaves Fastbooks Publishing
    3.5
  6. Nature’s Symphony of Serene Forest Cricket Sounds Mixed With Piano Rhythms For Deep Calm & Relaxation: Experience Soothing Nights for Restful Sleep & Mindfulness Using Enhanced BGM 8D Audio
    Nature’s Symphony of Serene Forest Cricket Sounds Mixed With Piano Rhythms For Deep Calm & Relaxation: Experience Soothing Nights for Restful Sleep & Mindfulness Using Enhanced BGM 8D Audio Cedar Skye
  7. Summary - Freakonomics: Based On The Book By Steven Levitt And Stephen Dubner
    Summary - Freakonomics: Based On The Book By Steven Levitt And Stephen Dubner Fastbooks Publishing
    4
  8. Django Unchained - The Ultimate Trivia Collection: From The Movie Directed By Quentin Tarantino
    Django Unchained - The Ultimate Trivia Collection: From The Movie Directed By Quentin Tarantino Film Trivia Metaverse
  9. 100 Quotes About Inner Peace That Will Transform Your Life: Finding Serenity Amidst Life's Turmoil
    100 Quotes About Inner Peace That Will Transform Your Life: Finding Serenity Amidst Life's Turmoil The Quotes Library
    5
  10. GED Secrets: Elevate Your Success and Conquer the Exam Today: "Boost your GED prep! Unlock engaging audio lessons for ultimate exam success today!"
    GED Secrets: Elevate Your Success and Conquer the Exam Today: "Boost your GED prep! Unlock engaging audio lessons for ultimate exam success today!" Ronan Cade
  11. Extended Summary - Maybe You Should Talk To Someone: Based On The Book By Lori Gottlieb
    Extended Summary - Maybe You Should Talk To Someone: Based On The Book By Lori Gottlieb Quick Reading Library
    1.5
  12. Extended Summary - Braving The Wilderness: Based On The Book By Brene Brown
    Extended Summary - Braving The Wilderness: Based On The Book By Brene Brown Quick Reading Library
    2
  13. Summary - Eat To Live: Based On The Book By Dr. Joel Fuhrman
    Summary - Eat To Live: Based On The Book By Dr. Joel Fuhrman Fastbooks Publishing
    3
  14. Summary - 1620 - A Critical Response To The 1619 Project: Based On The Book By Peter W. Wood
    Summary - 1620 - A Critical Response To The 1619 Project: Based On The Book By Peter W. Wood Library Of Stories
  15. Summary - Everything Is F*Cked: Based On The Book By Mark Manson
    Summary - Everything Is F*Cked: Based On The Book By Mark Manson Fastbooks Publishing

دائمًا برفقة Storytel

  • أكثر من 200000 عنوان

  • وضع الأطفال (بيئة آمنة للأطفال)

  • تنزيل الكتب للوصول إليها دون الاتصال بالإنترنت

  • الإلغاء في أي وقت

الكتب الأكثر استماعًا

شهري

قصص لكل المناسبات.

$9.99 /شهر

7 أيام مجانًا
  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن

سنويا

قصص لكل المناسبات.

$83.88 /سنة

7 أيام مجانًا
وفر 30%
  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن

6 أشهر

قصص لكل المناسبات.

$53.64 /6 أشهر

7 أيام مجانًا
وفر 11%
  • 1 حساب

  • استماع بلا حدود

  • إلغاء في أي وقت

جرب الآن