000 03613cam a22006018i 4500
001 on1273050376
003 OCoLC
005 20220711203723.0
006 m o d
007 cr |||||||||||
008 210914s2022 nju o 001 0 eng
010 _a 2021045283
040 _aDLC
_beng
_erda
_cDLC
_dOCLCO
_dDG1
_dUKAHL
_dIEEEE
_dOCLCF
019 _a1273426075
020 _a9781119771579
_q(electronic bk. : oBook)
020 _a1119771579
_q(electronic bk. : oBook)
020 _a9781119771562
_q(epub)
020 _a1119771560
_q(epub)
020 _a9781119771555
_q(adobe pdf)
020 _a1119771552
_q(adobe pdf)
020 _z9781119771531
_q(hardback)
024 7 _a10.1002/9781119771579
_2doi
035 _a(OCoLC)1273050376
_z(OCoLC)1273426075
037 _a9562694
_bIEEE
042 _apcc
050 0 0 _aQA76.9.A25
082 0 0 _a005.8
_223
049 _aMAIN
100 1 _aReznik, Leonid,
_d1955-
_eauthor.
_910259
245 1 0 _aIntelligent security systems :
_bhow artificial intelligence, machine learning and data science work for and against computer security /
_cLeon Reznik.
263 _a2112
264 1 _aHoboken, New Jersey :
_bWiley-IEEE Press,
_c[2022]
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aComputer Security with Artificial Intelligence, Machine Learning, and Data Science Combination -- Firewall Design and Implementation -- Intrusion Detection Systems -- Malware and Vulnerabilities Detection and Protection -- Hackers versus Normal Users -- Adversarial Machine Learning.
500 _aIncludes index.
520 _a"Intelligent Security Systems expertly combines artificial intelligence, machine learning techniques and computer security systems. This book uniquely concentrates on the design features of computer security tools and mechanisms, discussing how artificial intelligence (AI) and machine learning (ML) techniques are employed in industrial practice. The author -a noted expert on the topic - starts with an explanation of the basic concepts and terminology before going on to help the reader develop knowledge and practical skills on additional topics such as firewalls and malware detection, analyzing their design and functions within computer security, and delving deeper into the small aspects that make up the final security system. Aimed at undergraduate and graduate students, this book is built up of 5 modules, with each module allowing the reader to gain a deeper understanding of the many applications that are used to create expert computer systems. This book will support readers as they adapt their knowledge in intelligent security systems."--
_cProvided by publisher.
588 _aDescription based on print version record and CIP data provided by publisher; resource not viewed.
590 _bWiley Frontlist Obook All English 2021
650 0 _aComputer security.
_93970
650 0 _aArtificial intelligence.
_93407
650 0 _aMachine learning.
_91831
650 7 _aArtificial intelligence.
_2fast
_0(OCoLC)fst00817247
_93407
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
_93970
650 7 _aMachine learning.
_2fast
_0(OCoLC)fst01004795
_91831
655 4 _aElectronic books.
_93294
776 0 8 _iPrint version:
_aReznik, Leonid, 1955-
_tIntelligent security systems
_dHoboken, New Jersey : Wiley-IEEE Press, [2022]
_z9781119771531
_w(DLC) 2021045282
856 4 0 _uhttps://doi.org/10.1002/9781119771579
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c69650
_d69650