Introduction to Machine Learning with Applications in Information Security
English | ISBN: 1138626783 | 2017 | 364 Pages | PDF | 8 MB
Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn't prove theorems, or otherwise dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts.
The book covers core machine learning topics in-depth, including Hidden Markov Models, Principal Component Analysis, Support Vector Machines, and Clustering. It also includes coverage of Nearest Neighbors, Neural Networks, Boosting and AdaBoost, Random Forests, Linear Discriminant Analysis, Vector Quantization, Naive Bayes, Regression Analysis, Conditional Random Fields, and Data Analysis.
Most of the examples in the book are drawn from the field of information security, with many of the machine learning applications specifically focused on malware. The applications presented are designed to demystify machine learning techniques by providing straightforward scenarios. Many of the exercises in this book require some programming, and basic computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of programming experience should have no trouble with this aspect of the book.
Instructor resources, including PowerPoint slides, lecture videos, and other relevant material are provided on an accompanying website: http://cs.sjsu.edu/~stamp/ML/. For the reader's benefit, the figures in the book are also available in electronic form, and in color.
Industrial Cybersecurity: Efficiently secure critical infrastructure systems
Information Security: The Complete Reference, Second Edition
CompTIA Security+ Guide to Network Security Fundamentals, 5th Edition
Readings & Cases in Information Security
Network Security Monitoring: Basics for Beginners
SAP Security and Risk Management, 2nd edition
Hadoop for Finance Essentials
The Ethereum Beginners Guide
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Penetration Testing with the Bash Shel
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Hacking: Computer Hacking Beginners Guide (3156)
Hacking: Learn fast how to Hack any Wirele(2686)
Practical Linux Security Cookbook(2644)
Hacking: Learn fast Hack to hack, strategi(2463)
WiFi Hacking for Beginners: Learn Hacking (2383)
Hacking University: Mobile Phone & App Hac(2381)
Hacking: Tips and Tricks to Get Past the B(2296)
Hacking: Become a World Class Hacker, Hack(2252)
Hacking: The Beginner's Complete Guide To (2192)
Mastering Kali Linux for Advanced Penetrat(2166)
Hacking the Hacker: Learn From the Experts(2077)
RASPBERRY PI & HACKING: 2 Books in 1: THE (1991)
Kali Linux Network Scanning Cookbook - Sec(1954)
Mastering Kali Linux for Web Penetration T(1945)
Beginners guide to ethical hacking and pen(1797)