Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 500 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 14 días de prueba gratis, luego $24,900 COP/al mes
  • Cancela cuando quieras
Descarga la app
CO -Device Banner Block 894x1036

Machine Learning for Cybersecurity Cookbook: Over 80 recipes on how to implement machine learning algorithms for building security systems using Python

Idioma
Inglés
Format
Categoría

No ficción

Learn how to apply modern AI to create powerful cybersecurity solutions for malware, pentesting, social engineering, data privacy, and intrusion detection

Key Features

• Manage data of varying complexity to protect your system using the Python ecosystem

• Apply ML to pentesting, malware, data privacy, intrusion detection system(IDS) and social engineering

• Automate your daily workflow by addressing various security challenges using the recipes covered in the book

Book Description

Organizations today face a major threat in terms of cybersecurity, from malicious URLs to credential reuse, and having robust security systems can make all the difference. With this book, you'll learn how to use Python libraries such as TensorFlow and scikit-learn to implement the latest artificial intelligence (AI) techniques and handle challenges faced by cybersecurity researchers.

You'll begin by exploring various machine learning (ML) techniques and tips for setting up a secure lab environment. Next, you'll implement key ML algorithms such as clustering, gradient boosting, random forest, and XGBoost. The book will guide you through constructing classifiers and features for malware, which you'll train and test on real samples. As you progress, you'll build self-learning, reliant systems to handle cybersecurity tasks such as identifying malicious URLs, spam email detection, intrusion detection, network protection, and tracking user and process behavior. Later, you'll apply generative adversarial networks (GANs) and autoencoders to advanced security tasks. Finally, you'll delve into secure and private AI to protect the privacy rights of consumers using your ML models.

By the end of this book, you'll have the skills you need to tackle real-world problems faced in the cybersecurity domain using a recipe-based approach.

What you will learn

• Learn how to build malware classifiers to detect suspicious activities

• Apply ML to generate custom malware to pentest your security

• Use ML algorithms with complex datasets to implement cybersecurity concepts

• Create neural networks to identify fake videos and images

• Secure your organization from one of the most popular threats – insider threats

• Defend against zero-day threats by constructing an anomaly detection system

• Detect web vulnerabilities effectively by combining Metasploit and ML

• Understand how to train a model without exposing the training data

Who this book is for

This book is for cybersecurity professionals and security researchers who are looking to implement the latest machine learning techniques to boost computer security, and gain insights into securing an organization using red and blue team ML. This recipe-based book will also be useful for data scientists and machine learning developers who want to experiment with smart techniques in the cybersecurity domain. Working knowledge of Python programming and familiarity with cybersecurity fundamentals will help you get the most out of this book.

© 2019 Packt Publishing (eBook ): 9781838556341

Fecha de lanzamiento

eBook : 25 de noviembre de 2019

Otros también disfrutaron ...

  1. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  2. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  3. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  4. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
  5. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  6. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  7. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
  8. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  9. Cybercrime Investigators Handbook Graeme Edwards
  10. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  11. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  12. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  13. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  14. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
  15. The Art of Deception: Controlling the Human Element of Security William L. Simon
  16. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  17. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
  18. Schneier on Security Bruce Schneier
  19. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  20. How Smart Machines Think Sean Gerrish
  21. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  22. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
  23. Artificial Intelligence For Dummies Luca Massaron
  24. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  25. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
  26. Blockchain For Dummies Tiana Laurence
  27. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  28. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  29. Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS
  30. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  31. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  32. Building a Cyber Risk Management Program: Evolving Security for the Digital Age Brian Allen
  33. Cybersecutity First Principles Rick Howard
  34. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  35. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
  36. Ethical Hacking Introbooks Team
  37. If It's Smart, It's Vulnerable Mikko Hypponen
  38. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Mike Chapple
  39. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  40. The Creativity Code: How AI is learning to write, paint and think Marcus du Sautoy
  41. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  42. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  43. Biggest Cyber Crimes in the History Introbooks Team