headerdesktop englezawk14noi25

MAI SUNT 00:00:00:00

MAI SUNT

X

headermobile englezawk14noi25

MAI SUNT 00:00:00:00

MAI SUNT

X

Promotii popup img

🍂English Books -𝟐𝟎% -𝟑𝟎% ☁︎‎‎꙳❅

& 🚚Transport GRATUIT peste 50 lei!

Răsfoiește și comandă»

Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes

De (autor): John Paul Mueller

Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes - John Paul Mueller

Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes

De (autor): John Paul Mueller


Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day
Key Features: Discover how hackers rely on misdirection and deep fakes to fool even the best security systemsRetain the usefulness of your data by detecting unwanted and invalid modificationsDevelop application code to meet the security requirements related to machine learning
Book Description: Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning.As you progress to the second part, you'll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references.The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary's reputation. Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies.This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.
What You Will Learn: Explore methods to detect and prevent illegal access to your systemImplement detection techniques when access does occurEmploy machine learning techniques to determine motivationsMitigate hacker access once security is breachedPerform statistical measurement and behavior analysisRepair damage to your data and applicationsUse ethical data collection methods to reduce security risks
Who this book is for: Whether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have . While most resources available on this topic are written in a language m
Citește mai mult

-20%

transport gratuit

PRP: 388.45 Lei

!

Acesta este Prețul Recomandat de Producător. Prețul de vânzare al produsului este afișat mai jos.

310.76Lei

310.76Lei

388.45 Lei

Primești 310 puncte

Important icon msg

Primești puncte de fidelitate după fiecare comandă! 100 puncte de fidelitate reprezintă 1 leu. Folosește-le la viitoarele achiziții!

Livrare in 2-4 saptamani

Plasează rapid comanda

Important icon msg

Poți comanda acest produs introducând numărul tău de telefon. În cel mai scurt timp vei fi apelat de un operator Libris pentru preluarea datelor necesare.

Completează mai jos numărul tău de telefon

Descrierea produsului


Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day
Key Features: Discover how hackers rely on misdirection and deep fakes to fool even the best security systemsRetain the usefulness of your data by detecting unwanted and invalid modificationsDevelop application code to meet the security requirements related to machine learning
Book Description: Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning.As you progress to the second part, you'll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references.The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary's reputation. Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies.This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.
What You Will Learn: Explore methods to detect and prevent illegal access to your systemImplement detection techniques when access does occurEmploy machine learning techniques to determine motivationsMitigate hacker access once security is breachedPerform statistical measurement and behavior analysisRepair damage to your data and applicationsUse ethical data collection methods to reduce security risks
Who this book is for: Whether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have . While most resources available on this topic are written in a language m
Citește mai mult

S-ar putea să-ți placă și

De același autor

Părerea ta e inspirație pentru comunitatea Libris!

Istoricul tău de navigare

Acum se comandă

Noi suntem despre cărți, și la fel este și

Newsletter-ul nostru.

Abonează-te la veștile literare și primești un cupon de -10% pentru viitoarea ta comandă!

*Reducerea aplicată prin cupon nu se cumulează, ci se aplică reducerea cea mai mare.

Mă abonez image one
Mă abonez image one
Accessibility Logo

Salut! Te pot ajuta?

X