๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Hands-on artificial intelligence for cybersecurity implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

โœ Scribed by Parisi, Alessandro


Publisher
Packt Publishing
Year
2019
Tongue
English
Series
Hands-on
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Build smart cybersecurity systems with the power of machine learning and deep learning to protect your corporate assets

Key Features

- Identify and predict security threats using artificial intelligence
- Develop intelligent systems that can detect unusual and suspicious patterns and attacks
- Learn how to test the effectiveness of your AI cybersecurity algorithms and tools

Book Description

Today's organizations spend billions of dollars globally on cybersecurity. Artificial intelligence has emerged as a great solution for building smarter and safer security systems that allow you to predict and detect suspicious network activity, such as phishing or unauthorized intrusions.

This cybersecurity book presents and demonstrates popular and successful AI approaches and models that you can adapt to detect potential attacks and protect your corporate systems. You'll learn about the role of machine learning and neural networks, as well as deep learning in cybersecurity, and you'll also learn how you can infuse AI capabilities into building smart defensive mechanisms. As you advance, you'll be able to apply these strategies across a variety of applications, including spam filters, network intrusion detection, botnet detection, and secure authentication.

By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI.

What you will learn

- Detect email threats such as spamming and phishing using AI
- Categorize APT, zero-days, and polymorphic malware samples
- Overcome antivirus limits in threat detection
- Predict network intrusions and detect anomalies with machine learning
- Verify the strength of biometric authentication procedures with deep learning
- Evaluate cybersecurity strategies and learn how you can improve them

Who this book is for

If you're a cybersecurity professional or ethical hacker who wants to build intelligent systems using the power of machine learning and AI, you'll find this book useful. Familiarity with cybersecurity concepts and knowledge of Python programming is essential to get the most out of this book.

Table of Contents

- A Gentle Intro to AI for Cybersecurity Professionals
- Setting your AI for Cybersecurity Arsenal
- Ham or Spam? Detecting Email Cybersecurity Threats with AI
- Malware Threats Detection
- Network Anomaly Detection with AI
- Securing User Authentication
- Fraud Prevention with Cloud AI Solutions
- GANS: Attack and Defense
- Evaluating Algorithms
- Assessing your AI Arsenal


๐Ÿ“œ SIMILAR VOLUMES


Hands-On Artificial Intelligence for Cyb
โœ Alessandro Parisi ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Packt Publishing ๐ŸŒ English

Build smart cybersecurity systems with the power of machine learning and deep learning to protect your corporate assets Key Features โ€ข Identify and predict security threats using artificial intelligence โ€ข Develop intelligent systems that can detect unusual and suspicious patterns and attacks โ€ข

Applying Artificial Intelligence in Cybe
โœ Shilpa Mahajan; Mehak Khurana; Vania Vieira Estrela ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› WILEY ๐ŸŒ English

APPLYING ARTIFICIAL INTELLIGENCE IN CYBERSECURITY ANALYTICS AND CYBER THREAT DETECTION Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial Intellige

Applying Artificial Intelligence in Cybe
โœ Shilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Wiley ๐ŸŒ English

<span>APPLYING ARTIFICIAL INTELLIGENCE </span><span>IN</span><span> CYBERSECURITY ANALYTICS </span><span>AND</span><span> CYBER THREAT DETECTION</span><p><span>Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial i

Applying Artificial Intelligence in Cybe
โœ Shilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Wiley ๐ŸŒ English

<span>APPLYING ARTIFICIAL INTELLIGENCE </span><span>IN</span><span> CYBERSECURITY ANALYTICS </span><span>AND</span><span> CYBER THREAT DETECTION</span><p><span>Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial i

Applying Artificial Intelligence in Cybe
โœ Shilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Wiley ๐ŸŒ English

<span>APPLYING ARTIFICIAL INTELLIGENCE </span><span>IN</span><span> CYBERSECURITY ANALYTICS </span><span>AND</span><span> CYBER THREAT DETECTION</span><p><span>Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial i

Applying Artificial Intelligence in Cybe
โœ Shilpa Mahajan (editor), Mehak Khurana (editor), Vania Vieira Estrela (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Wiley ๐ŸŒ English

<span>APPLYING ARTIFICIAL INTELLIGENCE </span><span>IN</span><span> CYBERSECURITY ANALYTICS </span><span>AND</span><span> CYBER THREAT DETECTION</span><p><span>Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial i