Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 900 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 7 días de prueba gratis, luego $7.99 /mes
  • Cancela cuando quieras
Suscríbete ahora
Copy of Device Banner Block 894x1036 3

Machine Learning Security with Azure: Best practices for assessing, securing, and monitoring Azure Machine Learning workloads

Idioma
Inglés
Format
Categoría

No ficción

With AI and machine learning (ML) models gaining popularity and integrating into more and more applications, it is more important than ever to ensure that models perform accurately and are not vulnerable to cyberattacks. However, attacks can target your data or environment as well. This book will help you identify security risks and apply the best practices to protect your assets on multiple levels, from data and models to applications and infrastructure.

This book begins by introducing what some common ML attacks are, how to identify your risks, and the industry standards and responsible AI principles you need to follow to gain an understanding of what you need to protect. Next, you will learn about the best practices to secure your assets. Starting with data protection and governance and then moving on to protect your infrastructure, you will gain insights into managing and securing your Azure ML workspace. This book introduces DevOps practices to automate your tasks securely and explains how to recover from ML attacks. Finally, you will learn how to set a security benchmark for your scenario and best practices to maintain and monitor your security posture.

By the end of this book, you’ll be able to implement best practices to assess and secure your ML assets throughout the Azure Machine Learning life cycle.

© 2023 Packt Publishing (eBook): 9781805123958

Fecha de lanzamiento

eBook: 28 de diciembre de 2023

Otros también disfrutaron...

  1. Driven: The Race to Create the Autonomous Car Alex Davies
  2. Artificial Intelligence For Dummies Luca Massaron
  3. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
  4. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
  5. Hit Refresh: A Memoir by Microsoft’s CEO Satya Nadella
  6. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  7. Cognitive Architectures: Exploring the Foundations, Theories, and Practical Applications of Human-Like Intelligence Systems in AI, Robotics, and Beyond May Sherry
  8. Computational Thinking Peter J. Denning
  9. The Smart Home Manual: How to Automate Your Home to Keep Your Family Entertained, Comfortable, and Safe Marlon Buchanan
  10. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  11. The Adult CCRN Critical Care Registered Nurse Exam Study Guide: Deluxe Edition: Proven Methods for Passing the CCRN with Confidence - Complete Practice Tests with Answers Scientia Media Group
  12. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
  13. Summary of Iain Foulds's Learn Azure in a Month of Lunches IRB Media
  14. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  15. Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity (2 Manuscripts) ATTILA KOVACS
  16. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  17. The NSA Report: Liberty and Security in a Changing World Richard A. Clarke
  18. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  19. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  20. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
  21. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  22. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  23. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  24. Cybercrime Investigators Handbook Graeme Edwards
  25. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  26. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  27. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  28. CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Andrew Hutz
  29. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  30. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  31. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  32. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  33. Cybersecutity First Principles Rick Howard
  34. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
  35. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
  36. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  37. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
  38. Who Owns the Future? Jaron Lanier
  39. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  40. Cybersecurity All-in-One For Dummies Joseph Steinberg
  41. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  42. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  43. Cloud Security For Dummies Ted Coombs
  44. Cyber Hacking: Wars in Virtual Space Scientific American
  45. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  46. Arguing with Idiots: How to Stop Small Minds and Big Government Glenn Beck
  47. Data Science John D. Kelleher

Siempre con Storytel:

  • Acceso ilimitado

  • Modo sin conexión

  • Modo Infantil

  • Cancela en cualquier momento

Historias ilimitadas siempre
Oferta por tiempo limitado

Ilimitado

Para los que quieren escuchar y leer sin límites.

$7.99 /mes
  • 1 cuenta

  • Acceso ilimitado

  • Escucha y lee los títulos que quieras

  • Modo sin conexión + Modo Infantil

  • Cancela en cualquier momento

Pruébalo ahora