Leon Reznik - Intelligent Security Systems

Здесь есть возможность читать онлайн «Leon Reznik - Intelligent Security Systems» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Intelligent Security Systems: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Intelligent Security Systems»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

INTELLIGENT SECURITY SYSTEMS
Dramatically improve your cybersecurity using AI and machine learning Intelligent Security Systems,
Intelligent Security Systems
Intelligent Security Systems

Intelligent Security Systems — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Intelligent Security Systems», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

248 228

249 229

250 230

251 231

252 232

253 233

254 234

255 235

256 236

257 237

258 238

259 239

260 240

261 241

262 242

263 243

264 244

265 245

266 246

267 247

268 248

269 249

270 250

271 251

272 252

273 253

274 254

275 255

276 256

277 257

278 258

279 259

280 260

281 261

282 262

283 263

284 264

285 265

286 266

287 267

288 268

289 269

290 270

291 271

292 272

293 273

294 274

295 275

296 276

297 277

298 278

299 279

300 280

301 281

302 282

303 283

304 284

305 285

306 286

307 287

308 288

309 289

310 290

311 291

312 292

313 293

314 294

315 295

316 296

317 297

318 298

319 299

320 300

321 301

322 302

323 303

324 304

325 305

326 306

327 307

328 308

329 309

330 310

331 311

332 312

333 313

334 315

335 316

336 317

337 318

338 319

339 320

340 321

341 322

342 323

343 324

344 325

345 326

346 327

347 328

348 329

349 330

350 331

351 332

352 333

353 334

354 335

355 337

356 338

357 339

358 340

359 341

360 342

361 343

IEEE Press445 Hoes Lane Piscataway, NJ 08854

IEEE Press Editorial BoardEkram Hossain, Editor in Chief

Jón Atli Benediktsson Xiaoou Li Jeffrey Reed
Anjan Bose Lian Yong Diomidis Spinellis
David Alan Grier Andreas Molisch Sarah Spurgeon
Elya B. Joffe Saeid Nahavandi Ahmet Murat Tekalp

Intelligent Security Systems

How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security

Leon Reznik

Rochester Institute of Technology, Rochester, New York, USA

Copyright 2022 by The Institute of Electrical and Electronics Engineers Inc - фото 1 Copyright 2022 by The Institute of Electrical and Electronics Engineers Inc - фото 2

Copyright © 2022 by The Institute of Electrical and Electronics Engineers, Inc.

All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per‐copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750‐8400, fax (978) 750‐4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762‐2974, outside the United States at (317) 572‐3993 or fax (317) 572‐4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Cataloging‐in‐Publication Data Applied for :

ISBN: 9781119771531

Cover Design: Wiley

Cover Image: © AerialPerspective Works/E+/Getty Images

To my family, Alexandra, Dmitry, Michelle, and my students

Acknowledgments

Many organizations and individuals helped this book to appear, including my colleagues, students, editorial staff, family, and friends.

I would like to thank all of you but have to limit the list of names.

Thank you very much:

Adam, Adrian, Adwait, Aileen, Akhil, Akshay, Alex, Alok, Amit, Arpit, Ashwin, Andrew, Andrey, Ankan, Anna, Anthony, Asif, Ayush, Benjamin, Brian, Carl, Chinmay, Christian, Darrell, Devang, Dhaval, Dhivya, Dileep, Dinesh, Dmitry, Elisa, Forum, Gaurav, George, Greg, Howard, Igor, James, Jeffrey, Jeton, Jinesh, Jody, Joe, Josh, Juan, Juliet, Justin, Karl, Karteek, Krishna, Kurt, Maninder, Mansha, Matthew, Michael, Michelle, Milan, Mohammed, Mohan, Ninad, Ninel, Olga, Omar, Parinitha, Parth, Pooja, Praful, Punit, Qiaoran, Raja, Ravina, Renzil, Richard, Rishi, Robert, Rohan, Rohit, Roman, Ron, Sagar, Sahil, Salil, Samir, Sanjay, Sandhya, Saransh, Saurabh, Scott, Sergey, Shashank, Shravya, Simran, Stanislaw, Sudhish, Suraj, Suresh, Swati, Tayeb, Tejas, Utsav, Vanessa, Virendra, and Vladik.

At last but not at least, I want to acknowledge that some research reported in this book was supported in part by the following recent grants provided by:

National Science Foundation (award # ACI‐1547301),

National Security Agency (award # H98230‐I7‐l‐0200), and

US Military Academy/DoD (award # W911NF2010337).

Introduction I1 Who Is This Book For This books main goal is to provide - фото 3

Introduction

I.1 Who Is This Book For?

This book’s main goal is to provide helpto its readers and users:

students in computer security, science, engineering, IT and information systems‐related fields, both undergraduate and graduate, looking for a textbook to gain the knowledge and skills at the intersection of computer security and artificial intelligence, machine learning, and data science domains;

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Intelligent Security Systems»

Представляем Вашему вниманию похожие книги на «Intelligent Security Systems» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Intelligent Security Systems»

Обсуждение, отзывы о книге «Intelligent Security Systems» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x