000 04224cam a2200697 i 4500
001 on1273050376
003 OCoLC
005 20240523125543.0
006 m o d
007 cr |||||||||||
008 210914s2022 njua ob 001 0 eng
010 _a 2021045283
040 _aDLC
_beng
_erda
_cDLC
_dOCLCO
_dDG1
_dUKAHL
_dIEEEE
_dOCLCF
_dOCLCO
_dN$T
_dIEEEE
_dYDX
_dOCLCO
_dOCLCQ
_dYWS
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a1273426075
020 _a9781119771579
_qelectronic book
020 _a1119771579
_qelectronic book
020 _a9781119771555
_qelectronic book
020 _a1119771552
_qelectronic book
020 _a9781119771562
_qelectronic book
020 _a1119771560
_qelectronic book
020 _z9781119771531
_qhardcover
024 7 _a10.1002/9781119771579
_2doi
029 1 _aAU@
_b000072971281
035 _a(OCoLC)1273050376
_z(OCoLC)1273426075
037 _a9562694
_bIEEE
042 _apcc
050 0 4 _aQA76.9.A25
_bR438 2022
082 0 0 _a005.8
_223
049 _aMAIN
100 1 _aReznik, Leonid,
_d1955-
_eauthor.
245 1 0 _aIntelligent security systems :
_bhow artificial intelligence, machine learning and data science work for and against computer security /
_cLeon Reznik.
264 1 _aPiscataway, NJ :
_bIEEE Press ;
_aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc.,
_c[2022]
300 _a1 online resource :
_bcolor illustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aComputer Security with Artificial Intelligence, Machine Learning, and Data Science Combination -- Firewall Design and Implementation -- Intrusion Detection Systems -- Malware and Vulnerabilities Detection and Protection -- Hackers versus Normal Users -- Adversarial Machine Learning.
520 _a"Intelligent Security Systems expertly combines artificial intelligence, machine learning techniques and computer security systems. This book uniquely concentrates on the design features of computer security tools and mechanisms, discussing how artificial intelligence (AI) and machine learning (ML) techniques are employed in industrial practice. The author -a noted expert on the topic - starts with an explanation of the basic concepts and terminology before going on to help the reader develop knowledge and practical skills on additional topics such as firewalls and malware detection, analyzing their design and functions within computer security, and delving deeper into the small aspects that make up the final security system. Aimed at undergraduate and graduate students, this book is built up of 5 modules, with each module allowing the reader to gain a deeper understanding of the many applications that are used to create expert computer systems. This book will support readers as they adapt their knowledge in intelligent security systems."--
_cProvided by publisher.
588 _aDescription based on online resource; title from digital title page (viewed on April 11, 2022).
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security.
650 0 _aArtificial intelligence.
650 0 _aMachine learning.
650 2 _aComputer Security
650 2 _aArtificial Intelligence
650 2 _aMachine Learning
650 6 _aS�ecurit�e informatique.
650 6 _aIntelligence artificielle.
650 6 _aApprentissage automatique.
650 7 _aartificial intelligence.
_2aat
650 7 _aArtificial intelligence
_2fast
650 7 _aComputer security
_2fast
650 7 _aMachine learning
_2fast
758 _ihas work:
_aIntelligent security systems (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFxwWJ7dwxV96mFD4whwT3
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aReznik, Leonid, 1955-
_tIntelligent security systems
_dHoboken, New Jersey : Wiley-IEEE Press, [2022]
_z9781119771531
_w(DLC) 2021045282
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579
938 _aAskews and Holts Library Services
_bASKH
_nAH39250670
938 _aEBSCOhost
_bEBSC
_n3042927
994 _a92
_bINLUM
999 _c12834
_d12834