ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY: develop AI approaches to solve cybersecurity problems in your organization
Gain well-rounded knowledge of AI methods in cybersecurity and obtain hands-on experience in implementing them to bring value to your organization Key Features Familiarize yourself with AI methods and approaches and see how they fit into cybersecurity Learn how to design solutions in cybersecurity t...
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing Ltd.
2024
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781805124962/?ar |
Zusammenfassung: | Gain well-rounded knowledge of AI methods in cybersecurity and obtain hands-on experience in implementing them to bring value to your organization Key Features Familiarize yourself with AI methods and approaches and see how they fit into cybersecurity Learn how to design solutions in cybersecurity that include AI as a key feature Acquire practical AI skills using step-by-step exercises and code examples Purchase of the print or Kindle book includes a free PDF eBook Book Description Artificial intelligence offers data analytics methods that enable us to efficiently recognize patterns in large-scale data. These methods can be applied to various cybersecurity problems, from authentication and the detection of various types of cyberattacks in computer networks to the analysis of malicious executables. Written by a machine learning expert, this book introduces you to the data analytics environment in cybersecurity and shows you where AI methods will fit in your cybersecurity projects. The chapters share an in-depth explanation of the AI methods along with tools that can be used to apply these methods, as well as design and implement AI solutions. You'll also examine various cybersecurity scenarios where AI methods are applicable, including exercises and code examples that'll help you effectively apply AI to work on cybersecurity challenges. The book also discusses common pitfalls from real-world applications of AI in cybersecurity issues and teaches you how to tackle them. By the end of this book, you'll be able to not only recognize where AI methods can be applied, but also design and execute efficient solutions using AI methods. What you will learn Recognize AI as a powerful tool for intelligence analysis of cybersecurity data Explore all the components and workflow of an AI solution Find out how to design an AI-based solution for cybersecurity Discover how to test various AI-based cybersecurity solutions Evaluate your AI solution and describe its advantages to your organization Avoid common pitfalls and difficulties when implementing AI solutions Who this book is for This book is for machine learning practitioners looking to apply their skills to overcome cybersecurity challenges. Cybersecurity workers who want to leverage machine learning methods will also find this book helpful. Fundamental concepts of machine learning and beginner-level knowledge of Python programming are needed to understand the concepts present in this book. Whether you're a student or an experienced professional, this book offers a unique and valuable learning experience that will enable you to protect your network and data against the ever-evolving threat landscape. |
Umfang: | 1 Online-Ressource |
ISBN: | 9781805123552 1805123556 9781805124962 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-11015844X | ||
003 | DE-627-1 | ||
005 | 20241202095349.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241202s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781805123552 |c electronic bk. |9 978-1-80512-355-2 | ||
020 | |a 1805123556 |c electronic bk. |9 1-80512-355-6 | ||
020 | |a 9781805124962 |9 978-1-80512-496-2 | ||
035 | |a (DE-627-1)11015844X | ||
035 | |a (DE-599)KEP11015844X | ||
035 | |a (ORHE)9781805124962 | ||
035 | |a (DE-627-1)11015844X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20241112 | |
100 | 1 | |a Kolosnjaji, Bojan |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY |b develop AI approaches to solve cybersecurity problems in your organization |c Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras |
250 | |a 1st edition. | ||
264 | 1 | |a Birmingham, UK |b Packt Publishing Ltd. |c 2024 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Gain well-rounded knowledge of AI methods in cybersecurity and obtain hands-on experience in implementing them to bring value to your organization Key Features Familiarize yourself with AI methods and approaches and see how they fit into cybersecurity Learn how to design solutions in cybersecurity that include AI as a key feature Acquire practical AI skills using step-by-step exercises and code examples Purchase of the print or Kindle book includes a free PDF eBook Book Description Artificial intelligence offers data analytics methods that enable us to efficiently recognize patterns in large-scale data. These methods can be applied to various cybersecurity problems, from authentication and the detection of various types of cyberattacks in computer networks to the analysis of malicious executables. Written by a machine learning expert, this book introduces you to the data analytics environment in cybersecurity and shows you where AI methods will fit in your cybersecurity projects. The chapters share an in-depth explanation of the AI methods along with tools that can be used to apply these methods, as well as design and implement AI solutions. You'll also examine various cybersecurity scenarios where AI methods are applicable, including exercises and code examples that'll help you effectively apply AI to work on cybersecurity challenges. The book also discusses common pitfalls from real-world applications of AI in cybersecurity issues and teaches you how to tackle them. By the end of this book, you'll be able to not only recognize where AI methods can be applied, but also design and execute efficient solutions using AI methods. What you will learn Recognize AI as a powerful tool for intelligence analysis of cybersecurity data Explore all the components and workflow of an AI solution Find out how to design an AI-based solution for cybersecurity Discover how to test various AI-based cybersecurity solutions Evaluate your AI solution and describe its advantages to your organization Avoid common pitfalls and difficulties when implementing AI solutions Who this book is for This book is for machine learning practitioners looking to apply their skills to overcome cybersecurity challenges. Cybersecurity workers who want to leverage machine learning methods will also find this book helpful. Fundamental concepts of machine learning and beginner-level knowledge of Python programming are needed to understand the concepts present in this book. Whether you're a student or an experienced professional, this book offers a unique and valuable learning experience that will enable you to protect your network and data against the ever-evolving threat landscape. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Artificial intelligence |x Security measures | |
650 | 0 | |a Criminology | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Intelligence artificielle ; Sécurité ; Mesures | |
650 | 4 | |a Criminologie | |
650 | 4 | |a criminology | |
700 | 1 | |a Xiao, Huang |e VerfasserIn |4 aut | |
700 | 1 | |a Xu, Peng |d 1973- |e VerfasserIn |4 aut | |
700 | 1 | |a Zarras, Apostolis |e VerfasserIn |4 aut | |
776 | 1 | |z 180512496X | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 180512496X |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781805124962/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-11015844X |
---|---|
_version_ | 1821494924123570176 |
adam_text | |
any_adam_object | |
author | Kolosnjaji, Bojan Xiao, Huang Xu, Peng 1973- Zarras, Apostolis |
author_facet | Kolosnjaji, Bojan Xiao, Huang Xu, Peng 1973- Zarras, Apostolis |
author_role | aut aut aut aut |
author_sort | Kolosnjaji, Bojan |
author_variant | b k bk h x hx p x px a z az |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)11015844X (DE-599)KEP11015844X (ORHE)9781805124962 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04480nam a22004932 4500</leader><controlfield tag="001">ZDB-30-ORH-11015844X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241202095349.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241202s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781805123552</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-80512-355-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1805123556</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-80512-355-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781805124962</subfield><subfield code="9">978-1-80512-496-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)11015844X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP11015844X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781805124962</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)11015844X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20241112</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kolosnjaji, Bojan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY</subfield><subfield code="b">develop AI approaches to solve cybersecurity problems in your organization</subfield><subfield code="c">Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Gain well-rounded knowledge of AI methods in cybersecurity and obtain hands-on experience in implementing them to bring value to your organization Key Features Familiarize yourself with AI methods and approaches and see how they fit into cybersecurity Learn how to design solutions in cybersecurity that include AI as a key feature Acquire practical AI skills using step-by-step exercises and code examples Purchase of the print or Kindle book includes a free PDF eBook Book Description Artificial intelligence offers data analytics methods that enable us to efficiently recognize patterns in large-scale data. These methods can be applied to various cybersecurity problems, from authentication and the detection of various types of cyberattacks in computer networks to the analysis of malicious executables. Written by a machine learning expert, this book introduces you to the data analytics environment in cybersecurity and shows you where AI methods will fit in your cybersecurity projects. The chapters share an in-depth explanation of the AI methods along with tools that can be used to apply these methods, as well as design and implement AI solutions. You'll also examine various cybersecurity scenarios where AI methods are applicable, including exercises and code examples that'll help you effectively apply AI to work on cybersecurity challenges. The book also discusses common pitfalls from real-world applications of AI in cybersecurity issues and teaches you how to tackle them. By the end of this book, you'll be able to not only recognize where AI methods can be applied, but also design and execute efficient solutions using AI methods. What you will learn Recognize AI as a powerful tool for intelligence analysis of cybersecurity data Explore all the components and workflow of an AI solution Find out how to design an AI-based solution for cybersecurity Discover how to test various AI-based cybersecurity solutions Evaluate your AI solution and describe its advantages to your organization Avoid common pitfalls and difficulties when implementing AI solutions Who this book is for This book is for machine learning practitioners looking to apply their skills to overcome cybersecurity challenges. Cybersecurity workers who want to leverage machine learning methods will also find this book helpful. Fundamental concepts of machine learning and beginner-level knowledge of Python programming are needed to understand the concepts present in this book. Whether you're a student or an experienced professional, this book offers a unique and valuable learning experience that will enable you to protect your network and data against the ever-evolving threat landscape.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminologie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">criminology</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xiao, Huang</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Peng</subfield><subfield code="d">1973-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zarras, Apostolis</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">180512496X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">180512496X</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781805124962/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-11015844X |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:06Z |
institution | BVB |
isbn | 9781805123552 1805123556 9781805124962 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing Ltd. |
record_format | marc |
spelling | Kolosnjaji, Bojan VerfasserIn aut ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY develop AI approaches to solve cybersecurity problems in your organization Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras 1st edition. Birmingham, UK Packt Publishing Ltd. 2024 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Gain well-rounded knowledge of AI methods in cybersecurity and obtain hands-on experience in implementing them to bring value to your organization Key Features Familiarize yourself with AI methods and approaches and see how they fit into cybersecurity Learn how to design solutions in cybersecurity that include AI as a key feature Acquire practical AI skills using step-by-step exercises and code examples Purchase of the print or Kindle book includes a free PDF eBook Book Description Artificial intelligence offers data analytics methods that enable us to efficiently recognize patterns in large-scale data. These methods can be applied to various cybersecurity problems, from authentication and the detection of various types of cyberattacks in computer networks to the analysis of malicious executables. Written by a machine learning expert, this book introduces you to the data analytics environment in cybersecurity and shows you where AI methods will fit in your cybersecurity projects. The chapters share an in-depth explanation of the AI methods along with tools that can be used to apply these methods, as well as design and implement AI solutions. You'll also examine various cybersecurity scenarios where AI methods are applicable, including exercises and code examples that'll help you effectively apply AI to work on cybersecurity challenges. The book also discusses common pitfalls from real-world applications of AI in cybersecurity issues and teaches you how to tackle them. By the end of this book, you'll be able to not only recognize where AI methods can be applied, but also design and execute efficient solutions using AI methods. What you will learn Recognize AI as a powerful tool for intelligence analysis of cybersecurity data Explore all the components and workflow of an AI solution Find out how to design an AI-based solution for cybersecurity Discover how to test various AI-based cybersecurity solutions Evaluate your AI solution and describe its advantages to your organization Avoid common pitfalls and difficulties when implementing AI solutions Who this book is for This book is for machine learning practitioners looking to apply their skills to overcome cybersecurity challenges. Cybersecurity workers who want to leverage machine learning methods will also find this book helpful. Fundamental concepts of machine learning and beginner-level knowledge of Python programming are needed to understand the concepts present in this book. Whether you're a student or an experienced professional, this book offers a unique and valuable learning experience that will enable you to protect your network and data against the ever-evolving threat landscape. Computer security Artificial intelligence Security measures Criminology Sécurité informatique Intelligence artificielle ; Sécurité ; Mesures Criminologie criminology Xiao, Huang VerfasserIn aut Xu, Peng 1973- VerfasserIn aut Zarras, Apostolis VerfasserIn aut 180512496X Erscheint auch als Druck-Ausgabe 180512496X |
spellingShingle | Kolosnjaji, Bojan Xiao, Huang Xu, Peng 1973- Zarras, Apostolis ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY develop AI approaches to solve cybersecurity problems in your organization Computer security Artificial intelligence Security measures Criminology Sécurité informatique Intelligence artificielle ; Sécurité ; Mesures Criminologie criminology |
title | ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY develop AI approaches to solve cybersecurity problems in your organization |
title_auth | ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY develop AI approaches to solve cybersecurity problems in your organization |
title_exact_search | ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY develop AI approaches to solve cybersecurity problems in your organization |
title_full | ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY develop AI approaches to solve cybersecurity problems in your organization Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras |
title_fullStr | ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY develop AI approaches to solve cybersecurity problems in your organization Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras |
title_full_unstemmed | ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY develop AI approaches to solve cybersecurity problems in your organization Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras |
title_short | ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY |
title_sort | artificial intelligence for cybersecurity develop ai approaches to solve cybersecurity problems in your organization |
title_sub | develop AI approaches to solve cybersecurity problems in your organization |
topic | Computer security Artificial intelligence Security measures Criminology Sécurité informatique Intelligence artificielle ; Sécurité ; Mesures Criminologie criminology |
topic_facet | Computer security Artificial intelligence Security measures Criminology Sécurité informatique Intelligence artificielle ; Sécurité ; Mesures Criminologie criminology |
work_keys_str_mv | AT kolosnjajibojan artificialintelligenceforcybersecuritydevelopaiapproachestosolvecybersecurityproblemsinyourorganization AT xiaohuang artificialintelligenceforcybersecuritydevelopaiapproachestosolvecybersecurityproblemsinyourorganization AT xupeng artificialintelligenceforcybersecuritydevelopaiapproachestosolvecybersecurityproblemsinyourorganization AT zarrasapostolis artificialintelligenceforcybersecuritydevelopaiapproachestosolvecybersecurityproblemsinyourorganization |