32,39 €
32,39 €
inkl. MwSt.
Sofort per Download lieferbar
32,39 €
32,39 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
Als Download kaufen
32,39 €
inkl. MwSt.
Sofort per Download lieferbar
Jetzt verschenken
32,39 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
  • Format: ePub

Artificial intelligence offers data analytics methods that enable us to efficiently recognize patterns in large-scale data. These methods can be applied to various cybersecurity problems, from authentication and the detection of various types of cyberattacks in computer networks to the analysis of malicious executables.
Written by a machine learning expert, this book introduces you to the data analytics environment in cybersecurity and shows you where AI methods will fit in your cybersecurity projects. The chapters share an in-depth explanation of the AI methods along with tools that can
…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 7.11MB
  • FamilySharing(5)
Produktbeschreibung
Artificial intelligence offers data analytics methods that enable us to efficiently recognize patterns in large-scale data. These methods can be applied to various cybersecurity problems, from authentication and the detection of various types of cyberattacks in computer networks to the analysis of malicious executables.
Written by a machine learning expert, this book introduces you to the data analytics environment in cybersecurity and shows you where AI methods will fit in your cybersecurity projects. The chapters share an in-depth explanation of the AI methods along with tools that can be used to apply these methods, as well as design and implement AI solutions. You'll also examine various cybersecurity scenarios where AI methods are applicable, including exercises and code examples that'll help you effectively apply AI to work on cybersecurity challenges. The book also discusses common pitfalls from real-world applications of AI in cybersecurity issues and teaches you how to tackle them.
By the end of this book, you'll be able to not only recognize where AI methods can be applied, but also design and execute efficient solutions using AI methods.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Bojan Kolosnjaji is a researcher working at the intersection of artificial intelligence (AI) and cybersecurity. He has obtained his master's and PhD degrees in computer science from the Technical University of Munich (TUM), where he conducted research in anomaly detection methods in constrained environments. Bojan's academic work deals with anomaly detection problems in multiple cybersecurity-relevant scenarios, and the design of AI-based solutions to these problems. Bojan is currently working as a principal engineer in cybersecurity sciences and analytics, helping various cybersecurity teams deal with large-scale data, adopt AI practices and solutions, and understand security challenges in AI systems.