Machine learning and security: protecting systems with data and algorithms
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore...
Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Sebastopol, CA
O'Reilly Media
2018
|
Edition: | First edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781491979891/?ar |
Summary: | Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis. Machine learning and security specialists Clarence Chio and David Freeman provide a framework for discussing the marriage of these two fields, as well as a toolkit of machine-learning algorithms that you can apply to an array of security problems. This book is ideal for security engineers and data scientists alike -- |
Item Description: | Includes bibliographical references and index. - Online resource; title from title page (viewed March 12, 2018) |
Physical Description: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 1491979909 9781491979907 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04762051X | ||
003 | DE-627-1 | ||
005 | 20240228120443.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 1491979909 |9 1-4919-7990-9 | ||
020 | |a 9781491979907 |9 978-1-4919-7990-7 | ||
035 | |a (DE-627-1)04762051X | ||
035 | |a (DE-599)KEP04762051X | ||
035 | |a (ORHE)9781491979891 | ||
035 | |a (DE-627-1)04762051X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 006.3/1 |2 23 | |
100 | 1 | |a Chio, Clarence |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Machine learning and security |b protecting systems with data and algorithms |c Clarence Chio and David Freeman |
246 | 3 | 3 | |a Protecting systems with data and algorithms |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c 2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from title page (viewed March 12, 2018) | ||
520 | |a Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis. Machine learning and security specialists Clarence Chio and David Freeman provide a framework for discussing the marriage of these two fields, as well as a toolkit of machine-learning algorithms that you can apply to an array of security problems. This book is ideal for security engineers and data scientists alike -- | ||
650 | 0 | |a Machine learning | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 2 | |a Machine Learning | |
650 | 4 | |a Apprentissage automatique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a Machine learning | |
700 | 1 | |a Freeman, David |d 1979- |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781491979891/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-04762051X |
---|---|
_version_ | 1829007780936155137 |
adam_text | |
any_adam_object | |
author | Chio, Clarence Freeman, David 1979- |
author_facet | Chio, Clarence Freeman, David 1979- |
author_role | aut aut |
author_sort | Chio, Clarence |
author_variant | c c cc d f df |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04762051X (DE-599)KEP04762051X (ORHE)9781491979891 |
dewey-full | 006.3/1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3/1 |
dewey-search | 006.3/1 |
dewey-sort | 16.3 11 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02424cam a22004812c 4500</leader><controlfield tag="001">ZDB-30-ORH-04762051X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120443.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491979909</subfield><subfield code="9">1-4919-7990-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491979907</subfield><subfield code="9">978-1-4919-7990-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04762051X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04762051X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781491979891</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04762051X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3/1</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chio, Clarence</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Machine learning and security</subfield><subfield code="b">protecting systems with data and algorithms</subfield><subfield code="c">Clarence Chio and David Freeman</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Protecting systems with data and algorithms</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (viewed March 12, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis. Machine learning and security specialists Clarence Chio and David Freeman provide a framework for discussing the marriage of these two fields, as well as a toolkit of machine-learning algorithms that you can apply to an array of security problems. This book is ideal for security engineers and data scientists alike --</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Machine Learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Apprentissage automatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Freeman, David</subfield><subfield code="d">1979-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781491979891/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04762051X |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:45Z |
institution | BVB |
isbn | 1491979909 9781491979907 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Chio, Clarence VerfasserIn aut Machine learning and security protecting systems with data and algorithms Clarence Chio and David Freeman Protecting systems with data and algorithms First edition. Sebastopol, CA O'Reilly Media 2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from title page (viewed March 12, 2018) Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis. Machine learning and security specialists Clarence Chio and David Freeman provide a framework for discussing the marriage of these two fields, as well as a toolkit of machine-learning algorithms that you can apply to an array of security problems. This book is ideal for security engineers and data scientists alike -- Machine learning Computer security Computer Security Machine Learning Apprentissage automatique Sécurité informatique Freeman, David 1979- VerfasserIn aut |
spellingShingle | Chio, Clarence Freeman, David 1979- Machine learning and security protecting systems with data and algorithms Machine learning Computer security Computer Security Machine Learning Apprentissage automatique Sécurité informatique |
title | Machine learning and security protecting systems with data and algorithms |
title_alt | Protecting systems with data and algorithms |
title_auth | Machine learning and security protecting systems with data and algorithms |
title_exact_search | Machine learning and security protecting systems with data and algorithms |
title_full | Machine learning and security protecting systems with data and algorithms Clarence Chio and David Freeman |
title_fullStr | Machine learning and security protecting systems with data and algorithms Clarence Chio and David Freeman |
title_full_unstemmed | Machine learning and security protecting systems with data and algorithms Clarence Chio and David Freeman |
title_short | Machine learning and security |
title_sort | machine learning and security protecting systems with data and algorithms |
title_sub | protecting systems with data and algorithms |
topic | Machine learning Computer security Computer Security Machine Learning Apprentissage automatique Sécurité informatique |
topic_facet | Machine learning Computer security Computer Security Machine Learning Apprentissage automatique Sécurité informatique |
work_keys_str_mv | AT chioclarence machinelearningandsecurityprotectingsystemswithdataandalgorithms AT freemandavid machinelearningandsecurityprotectingsystemswithdataandalgorithms AT chioclarence protectingsystemswithdataandalgorithms AT freemandavid protectingsystemswithdataandalgorithms |