Get Free Shipping on orders over $79
Machine Learning Security Principles : Keep data, networks, users, and applications safe from prying eyes - John Paul Mueller

Machine Learning Security Principles

Keep data, networks, users, and applications safe from prying eyes

By: John Paul Mueller

eText | 30 December 2022 | Edition Number 1

At a Glance

eText


$57.19

or 4 interest-free payments of $14.30 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Thwart hackers by preventing, detecting, and misdirecting attempted access before the hacker can obtain credentials, engage in fraud, dig in deep, modify data, corrupt users, and otherwise completely ruin your day.

Key Features

  • Discover how hackers now rely on deep fakes to fool even the best security system.
  • Retain the usefulness of your data by detecting unwanted and invalid modifications.
  • Develop application code that addresses a number of security needs related to machine learning.

Book Description

Machine learning is the most important new technology for getting more out of data today. It can reveal patterns that aren't obvious, for example, but it requires data, lots of it. Data gathering isn't just about data. It affects users and requires the use of applications to clean, manipulate, and analyze the data. Obtaining data in an ethical manner is important because the very act behaving ethically reduces the security risk associated with data. However, hackers don't necessarily target users and their data. Perhaps they're interested in your organization's trade secrets or committing fraud. They might simply be interested in lurking in the background and committing mischief. So, just keeping your data secure as a means of protecting your machine learning investment isn't enough. You need to do more.

This book helps you get the big picture from a machine learning perspective using all the latest research available on methods that hackers use to break into your system. It's about the whole system, not just your application. You discover techniques that help you gather data ethically and keep it safe, while also preventing all sorts of illegal access method from even occurring. In fact, you use machine learning as a tool to keep hackers at bay and discover their true intent for your organization.

What you will learn

  • Learn methods to prevent illegal access to your system
  • Discover detection techniques when access does occur
  • Employ machine learning techniques to determine motivations
  • Mitigate hacker access using a variety of methods
  • Repair damage to your data and applications
  • Use ethical data collection methods to reduce security risks

Who This Book Is For

Data scientists and computer scientists who develop machine learning applications of any type including students will find this book helpful. Machine Learning and Security researchers and scientists that are involved in some type of theoretical activity that benefits from machine learning will benefit from this book. Having working knowledge of Python Programming is required to get the best from this book.

Table of Contents

  1. Defining Machine Learning Security
  2. Mitigating Risk at Training by Validating and Maintaining Datasets
  3. Mitigating Inference Risk by Avoiding Adversarial Machine Learning Attacks
  4. Considering the Threat Environment
  5. Keeping Your Network Clean
  6. Detecting and Analyzing Anomalies
  7. Dealing with Malware
  8. Locating Potential Fraud
  9. Defending Against Hackers
  10. Considering the Ramifications of Deepfakes
  11. Leveraging Machine Learning Against Hacking
  12. Embracing Ethical Behavior
on
Desktop
Tablet
Mobile

More in Computer Viruses

Cyber Threat Hunting - Nadhem AlFardan

eBOOK

The AI of War - Nathan McGrath

eBOOK

$4.99

Cybersecurity - Phillip Ferraro

eBOOK

$15.99

Learning ParrotOS - Arvin Destar

eBOOK

Industrial Cybersecurity - Anand Shinde

eBOOK

El Plan Cibernetico - Andre Edmond

eBOOK

Defense in Depth - Qasim

eBOOK

$39.99