

Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes (Paperback)
Key item features
Specs
- Book formatPaperback
- Fiction/nonfictionNon-Fiction
- GenreComputing & Internet
- Publication dateDecember, 2022
- Pages450
- EditionStandard Edition
- Free shipping
Free 90-day returns
How do you want your item?
Get free delivery, shipping and more*
Similar items you might like
Based on what customers bought
Machine Learning for Red Team Hackers: Learn The Most Powerful Tools in Cybersecurity (Paperback) $28.63
$2863current price $28.63Machine Learning for Red Team Hackers: Learn The Most Powerful Tools in Cybersecurity (Paperback)
Sharing Big Data Safely: Managing Data Security (Paperback) $26.29
$2629current price $26.29Sharing Big Data Safely: Managing Data Security (Paperback)
Building Responsible AI Algorithms: A Framework for Transparency, Fairness, Safety, Privacy, and Robustness, (Paperback) $28.48
$2848current price $28.48Building Responsible AI Algorithms: A Framework for Transparency, Fairness, Safety, Privacy, and Robustness, (Paperback)
Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF, (Paperback) $43.13
$4313current price $43.13Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF, (Paperback)
Data Science Programming All-In-One FD P, (Paperback) $10.05 Was $11.86
$1005current price $10.05, Was $11.86$11.86Data Science Programming All-In-One FD P, (Paperback)
Computer Science Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You , Book 4, (Paperback) $19.35
$1935current price $19.35Computer Science Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You , Book 4, (Paperback)
The Cybersecurity Mesh Architecture: Composable, flexible, and scalable security approach for a resilient security ecosy, (Paperback) $25.91
$2591current price $25.91The Cybersecurity Mesh Architecture: Composable, flexible, and scalable security approach for a resilient security ecosy, (Paperback)
Applied Network Security Monitoring: Collection, Detection, and Analysis, (Paperback) $49.95
$4995current price $49.95Applied Network Security Monitoring: Collection, Detection, and Analysis, (Paperback)
Autonomous Data Security: Creating a Proactive Enterprise Protection Plan, (Paperback) $39.97
$3997current price $39.97Autonomous Data Security: Creating a Proactive Enterprise Protection Plan, (Paperback)
Analysis of suitable generative algorithms for the generation of safety-critical driving data in the field of autonomous, (Paperback) $31.13
$3113current price $31.13Analysis of suitable generative algorithms for the generation of safety-critical driving data in the field of autonomous, (Paperback)
Web Application Defender's Cookbook: Battling Hackers and Protecting Users, (Paperback) $19.99
$1999current price $19.99Web Application Defender's Cookbook: Battling Hackers and Protecting Users, (Paperback)
Zero Trust Security Demystified: Your Roadmap to a Resilient Network and Unparalleled Data Protection, (Hardcover) $25.99
$2599current price $25.99Zero Trust Security Demystified: Your Roadmap to a Resilient Network and Unparalleled Data Protection, (Hardcover)
Computer Science Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You , Book 4, (Hardcover) $25.65
$2565current price $25.65Computer Science Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You , Book 4, (Hardcover)
Simple Steps to Data Encryption: A Practical Guide to Secure Computing, (Paperback) $40.06
$4006current price $40.06Simple Steps to Data Encryption: A Practical Guide to Secure Computing, (Paperback)
Securing the Clicks: Network Security in the Age of Social Media, (Paperback) $30.35
$3035current price $30.35Securing the Clicks: Network Security in the Age of Social Media, (Paperback)
Obtaining Value from Big Data for Service Systems, Volume II: Big Data Technology, (Paperback) $20.92 Was $24.99
$2092current price $20.92, Was $24.99$24.99Obtaining Value from Big Data for Service Systems, Volume II: Big Data Technology, (Paperback)
Artificial Intelligence for Safety-Critical Automotive Applications: Navigating Functional Safety and Cybersecurity Stan, (Paperback) $13.90
$1390current price $13.90Artificial Intelligence for Safety-Critical Automotive Applications: Navigating Functional Safety and Cybersecurity Stan, (Paperback)
Machine Learning For Dummies, (Paperback) $12.16
$1216current price $12.16Machine Learning For Dummies, (Paperback)
15 out of 5 Stars. 1 reviewsNet Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, (Paperback) $20.36 Was $24.99
$2036current price $20.36, Was $24.99$24.99Net Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security, (Paperback)
About this item
Product details
Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day
Key Features:
- Discover how hackers rely on misdirection and deep fakes to fool even the best security systems
- Retain the usefulness of your data by detecting unwanted and invalid modifications
- Develop application code to meet the security requirements related to machine learning
Book Description:
Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning.
As you progress to the second part, you'll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references.
The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary's reputation. Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies.
This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.
By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.
What You Will Learn:
- Explore methods to detect and prevent illegal access to your system
- Implement detection techniques when access does occur
- Employ machine learning techniques to determine motivations
- Mitigate hacker access once security is breached
- Perform statistical measurement and behavior analysis
- Repair damage to your data and applications
- Use ethical data collection methods to reduce security risks
Who this book is for:
Whether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have . While most resources available on this topic are written in a language more suitable for experts, this guide presents security in an easy-to-understand way, employing a host of diagrams to explain concepts to visual learners. While familiarity with machine learning concepts is assumed, knowledge of Python and programming in general will be useful.

