You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Work on 10 practical projects, each with a blueprint for a different machine learning technique, and apply them in the real world to fight against cybercrime Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn how to frame a cyber security problem as a machine learning problem Examine your model for robustness against adversarial machine learning Build your portfolio, enhance your resume, and ace interviews to become a cybersecurity data scientist Book Description Machine learning in security is harder than other domains because of the changing nature and abilities of adversaries, high stakes, and a lack of ground-truth data. This book will prepare machine learn...
Learn data architecture essentials and prepare for the Salesforce Certified Data Architect exam with the help of tips and mock test questions Key FeaturesLeverage data modelling, Salesforce database design, and techniques for effective data designLearn master data management, Salesforce data management, and how to include considerationsGet to grips with large data volumes, performance tuning, and poor performance mitigation techniquesBook Description The Salesforce Data Architect is a prerequisite exam for the Application Architect half of the Salesforce Certified Technical Architect credential. This book offers complete, up-to-date coverage of the Salesforce Data Architect exam so you can t...
This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security. It explores the recent advancement in field of Artificial Intelligence, Blockchain, Communication and Security in this digital era for novice to profound knowledge about cutting edges in artificial intelligence, financial, secure transaction, monitoring, real time assistance and security for advanced stage lear...
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges. It further covers three security aspects including Internet of Things device identification and authentication, network traffic intrusion detection, and executable malware files detection. This book: Presents a security framework model design named Behavioral Network Traffic Identification and Novelty Anomaly Detection for the IoT Infrastructures Highlights recent advancements in machine learning, deep learning, and networking st...
This book presents a key solution for current and future technological issues, adopting an integrated system approach with a combination of software engineering applications. Focusing on how software dominates and influences the performance, reliability, maintainability and availability of complex integrated systems, it proposes a comprehensive method of improving the entire process. The book provides numerous qualitative and quantitative analyses and examples of varied systems to help readers understand and interpret the derived results and outcomes. In addition, it examines and reviews foundational work associated with decision and control systems for information systems, to inspire resear...
The volume presents high quality research papers presented at Second International Conference on Information and Communication Technology for Intelligent Systems (ICICC 2017). The conference was held during 2–4 August 2017, Pune, India and organized communally by Dr. Vishwanath Karad MIT World Peace University, Pune, India at MIT College of Engineering, Pune and supported by All India Council for Technical Education (AICTE) and Council of Scientific and Industrial Research (CSIR). The volume contains research papers focused on ICT for intelligent computation, communications and audio, and video data processing.
When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can stand up to the most sophisticated attacks? Grokking Web Application Security is a brilliantly illustrated and clearly written guide that delivers detailed coverage on: How the browser security model works, including sandboxing, the same-origin policy, and methods of securing cookies Securing web servers with input validation, escaping of output, and defense in depth A development process that prevents security bugs Protecting yourself from browser vulnerabilities such as cross-site scripting, cross-site request forgery, and clickjacking Network vulnerabilities like man-in-th...
Boost your AI and generative AI accuracy using real-world datasets with over 150 functional object-oriented methods and open source libraries Purchase of the print or Kindle book includes a free PDF eBook Key Features Explore beautiful, customized charts and infographics in full color Work with fully functional OO code using open source libraries in the Python Notebook for each chapter Unleash the potential of real-world datasets with practical data augmentation techniques Book Description Data is paramount in AI projects, especially for deep learning and generative AI, as forecasting accuracy relies on input datasets being robust. Acquiring additional data through traditional methods can be...
Learn how to apply modern AI to create powerful cybersecurity solutions for malware, pentesting, social engineering, data privacy, and intrusion detection Key FeaturesManage data of varying complexity to protect your system using the Python ecosystemApply ML to pentesting, malware, data privacy, intrusion detection system(IDS) and social engineeringAutomate your daily workflow by addressing various security challenges using the recipes covered in the bookBook Description Organizations today face a major threat in terms of cybersecurity, from malicious URLs to credential reuse, and having robust security systems can make all the difference. With this book, you'll learn how to use Python libra...