Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
Ebook618 pages4 hours

Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Build smart cybersecurity systems with the power of machine learning and deep learning to protect your corporate assets

Key Features
  • Identify and predict security threats using artificial intelligence
  • Develop intelligent systems that can detect unusual and suspicious patterns and attacks
  • Learn how to test the effectiveness of your AI cybersecurity algorithms and tools
Book Description

Today's organizations spend billions of dollars globally on cybersecurity. Artificial intelligence has emerged as a great solution for building smarter and safer security systems that allow you to predict and detect suspicious network activity, such as phishing or unauthorized intrusions.

This cybersecurity book presents and demonstrates popular and successful AI approaches and models that you can adapt to detect potential attacks and protect your corporate systems. You'll learn about the role of machine learning and neural networks, as well as deep learning in cybersecurity, and you'll also learn how you can infuse AI capabilities into building smart defensive mechanisms. As you advance, you'll be able to apply these strategies across a variety of applications, including spam filters, network intrusion detection, botnet detection, and secure authentication.

By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI.

What you will learn
  • Detect email threats such as spamming and phishing using AI
  • Categorize APT, zero-days, and polymorphic malware samples
  • Overcome antivirus limits in threat detection
  • Predict network intrusions and detect anomalies with machine learning
  • Verify the strength of biometric authentication procedures with deep learning
  • Evaluate cybersecurity strategies and learn how you can improve them
Who this book is for

If you’re a cybersecurity professional or ethical hacker who wants to build intelligent systems using the power of machine learning and AI, you’ll find this book useful. Familiarity with cybersecurity concepts and knowledge of Python programming is essential to get the most out of this book.

LanguageEnglish
Release dateAug 2, 2019
ISBN9781789805178
Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

Related to Hands-On Artificial Intelligence for Cybersecurity

Related ebooks

Intelligence (AI) & Semantics For You

View More

Related articles

Reviews for Hands-On Artificial Intelligence for Cybersecurity

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Hands-On Artificial Intelligence for Cybersecurity - Alessandro Parisi

    P`book_preview_excerpt.html}r6`j&և:d3ۖ,[IulmmIt7"6Z?;ܧOrْ'<88{[RFte!.F^2Sbejq_ڪu:~_mjSߟT8*V[Y7b~)6jksU˵p!FfV"W[lR5;Sf+ pS e-y{8ןbݼ W[Ѱ8fÙ^oO:}1om,&6 A-UʏōϬڊ1b+bUUT>1ʅ.ߛZX1C|&`M-KMZ{?-ϭ3ƴ L4|حZmJ^|Mz&c -a!+kk@?+vא:eujg=T=z/ ۈ(XV `jPmkEd$_.qܭB?`&lh&3e#uK&[Sl;Y=@~V8:MMh:UBG j`'\0Ce NXQBe˭\T3ZX6Zj d6A1,\@tŞ,ÿ9fá$ăQ%,|pHwp\"`942D{d#CӢt4-#\&+F,6ein%C(Z񐡜]0c՟ok> gRٯ-p*߱5plq̽ӹaVaw&#\`AT)^nFr'kG6o!W:166R3c\5pqlF:\}ل*䓺Hq#u[F9b6G0FXA1{ӊ%Qܲdp`?H*X\b0YN-O 9~P˄fcv R? Q_L6'Xp o~D#WEѩg4e eF([)Ԁ >3=ҊPxq E(f &6APX<Ģu&CAN3Cդlf b I̱F\쀧_a2 S^0,Ӓf|L&5+DR@bQYRY@ZÍL EETCXCvx lQr+ `*QL M͒|JJf^xkqb?&"\tq4oi_yic@)#52E0B&な  jV} _@DZeZoߝ%Lgq c`4(ϗ^7fm1Mܧ/zTJ!R~u*@/ Tj$R$r@F&Fh\6L#XG'آDC,-DB*wC/Сkv,pP!.נF'M\^(`xd_0o,6`WGXȱtb O,zt*"An*2*?c3Y: 9蠍ZI &&(= +Mg  x׋ +ؔ1͢qc;QΈ]Ձ_3+kXgol 4ި8,#tӈwm ǂ v2, +I( \YG~Z&&`w LC,4pȞ)]``9I84C;$D55jelU3 \j6xyJ>ihSvEjH]-~GE GUx MeB1W54E~jCqZc.r8F ]`4H0h),Hª-c4tkP@o\J9ތ-hkݠ|YZ0sA}lHu>{TX">, xuz 1zx `6mQsKD`Rcx [sNg_% )=Ha l+am;"+j%Vh-`0n9~VU z_5 Q"\ l`-yj TP W(ɡ4%ZIq7:S鐑iO`2+w~*LK`[0/W2Aqͪŵ1#b8G"AVgflJXiXrIXf 1 "u# 7Jx8-l \L" ]lQGDk/2Xdd/n᎔{sUĂbCMN`d(E!eQϸC@etIzzb:bO%KĈ~zjn&L9J3t&CEs$]֊W5-ށ 0٦zYpUT:򌒧2 esN g|* 0d;C h?FIv`npiz<'Ɔ7,󘍇X)(՛y`Ճ1[)Š#\Q#Йt \0Ny z_6hKl*ݾRtJO haU>silI^UDy6p-zuစ.22Hhj -LZN=y@ڎLgv,:NHl H~f+Px3GpVkjssk!ULL66Ȫ$*Z-BYD9=׺; ׯ;k}p$3w--l׵Z{;rU+x󷷄ˠy8uaA:}UK4O2c`;grgOmPe j2Ӏ)v)eG!}Wxq nNĵOLvp3. UQu(4؃%|2ơcO9I= \@F^(T!~v)>V{i{?erx@b^1ccʒăK Tȡ~K˂>dm1K{dC'z~5x)[01˧)X/ `a?sHԉuir) ɫ7<{9 II Jn n+uEu}-A%LnnȫFZբgS]| V6~v !pe1Zn6쉆و1c'Uj^zi5uD}su/BY;$*$Q kht^,s-:{ l7pf{K.(0` 'n)Xi &瑬͈W:_xZYXlcUUx6^@``PL7uc$^*S 7;t^ֵl~$K"]gv%;{ j^i0+Ez`t۴Ql‹Rpyxr *O۴񥹆EmF;#h5l#S DKW,V%QzEW,M辂`I1C/l p#!f a%r^=ȢuW<8ؘ#+*͑,=ct89hGCc!mCM:RҫASEflvЅ@QxzEFnMMh=~U}LY} x&b?ƫ\"Ly\t2w973l0Bk1aTpku=F% 6K AYظrqr攋q󦗻ɑb4T-Qo- vßb4pk?kKqy+e;j*_kBH$i:z8rJ\@B8 6zezX6ۊ=Ě1DiJEWcjQRJp7zrTڱt;뾗%=tqkq8yf g~)A)$RA^\>qLLEuqozKW!kqN܎΂`xa{ƋJ[c`/>,),9BSjA}X'EO$ߕ8t2kI #N޾n:46ځ8^7#{ EVU8}(3#eN!9Zec3w$܍0t (yf0^Pb]x; [7G}s=ID D Bap-jm%l# r$hk>2HnӄBwoyNӻ)užtC|{wiՄ)V닥1 ꤕ_j&dHoA5Ƨ0,G:2?/o : Eh&p \7&{[g}W xnjp)碏'|{-~ o3ױ,rt4TzqU6}-xD\RFN l:/^ {C]?Qs ֥ /( l舕g.ӷhMYxa䛆dS8Un!{DG5+ S77=@_”)'RSnF|IiskI=t"NG2"4UeͧosVĎʵ,RDz/ŵ4h6h!lt|nàx'ox^fJd=LM7)lO!| <&ӕhN1?+7"w!y<84ߢEy0MQ(ΞxKIױRȤ$Fr7f] `c e*^9Rw2*6 Tb|k]GR鼻1t`#yCFn?R̡t!Ku]=S+߮܏w h B;mGlZhb`@.8Pm򼃊UҦ"xց2:KYTi1vx-:x K;K6֢5szъr^|5W+ֆC|j2/H?] Q ضʗ$o\b 'd |4});sאn3O|]c @[' ݩsMҺ6-Pa rq&xXϐN7z)^yj[ȥ*;\k91zY 'A}^>jZ"blH5ҋv$GT֠Yk_̰ݕ\pr{F,[;$^a0 >$ XG|m[9`RhB&c!azNǺ~eLR-/o0[UcEA a\{% 5\YFTA/>)w a20,&/SA,XanPaӜ3\D"[\NF;$ \C6*@aB ˸ h։Y7'0%qŷ\RQ.? 2=Uӛ>q!Tek[Wc%P-Br'mvCtỈǰIPXRLH’QptD lIk[JʙSƋ*Vj"ݪBnr&glOLJ|U%(s`o0 ԺzpzJij3Ű#L-JcQa6MT b5\F"zD`3麧XʹTy`@vCKB IE#LU(|%ڰZf(<ʕHsg*j:-җ@"5&ͽNJֺ=V \7PT 5 ЏJ`"3;+}(#g8Daa9헋W@SaXi:kW'9/7!s|銺^:I x';YǢhQ1: Y\>\螰3t*~ᕷ~|l,oWJieaY-zрAeJQPnc%`Poǜ {A J*>A+>\ܚx!Llxo}ĸy.G^>;̘/yd'ǘ͠x?as8q%"`A%w划l9j-f ЮeAS)|%Z,8 "nK{ad&Rѱ*,>eFӥ'!.v͊3ұdfS*N,`υh,n;L9UHT B4Ep)'^!+[;Az#yOcUŐ[sŠUF;+*(tk8*IKj2x5U"ʉXJYn% PmLV\찤V= *QarNOvZ%zX4`f2N,ERh>.MhIÊ\:ֿA鏌^zwkOZ;/.-^쫨RgrRE}\Sॗ xu'8 TlK| zk \sh4cɳ 4M%PG@w[Wq',nu1Vu]Lxы1l1SҖeG,ًEgxGȅ]>_IfG|aO yE=Ewca]$8F'\)1 x3MŞGRjlG:L{pȭGdžW+1GQUI<./*㡷$ǡ"m3BoR1'P`MXŏ> J@QG%˾}W~H6Ƒr:RׅC$ |մuȨ¥fԑѥgՈ.u K/0RL~ǘ:up5C`ij&t}֠ t^E^?9btǮQf՘SPw7K6|`t0dE7x,>>g'Ȉ4^̲/*vI3Kpt%J0v:+/ѶX_FQ;%f_1C.G/5E+耱|KHm&0rQC3V>|UXC=a{Cض 5LtW,VquAN&0lGwpEm|t*ߛ\5Q]Gs. =|{` 71g+ߣ Њ?,@{j^PXSx(2rt?D\M5Z7GIʣ[ ㊳ͽK7]!L(] UϺ4trCբ;'w$Q#c-ѤGAum61g(cW?ᱡG@L l{C' CD0Uhc&'ʥ\_ne :P0k'**b`rcͿp(q( "(M=ɵDf<ZdFƇϲ[d0ZINw}I}s⨤=$dF l$r.:4l8]FJ";,>}w)%X]gS!g_OdLfMZbNSX4掐想eSh>hxX6n98$ܓYΡc{CgJ"h\; 1&5@uǘYw†;x.+J@ ~9ûǯ]7 F}Gُ>M43m_< :#nـ4s{i==F9)]eeC^fc'@#?4 p7Gj ugag/g簵u~W&4*/ڗ]3OAOKס'=4,ko1`-S.ab =zxX·t$bޡ2xa\`NLX:;HTU0BIh9{-ξl=*yNOkdVz[|mMR,GM -}^3 "v̱b U(\VU㕽kM3"7*ck\f&qΠ3;CM9Rct'>%kBM |@ӸW1KӅnf7$F܊]FZJI 8N |9} xVAWb%V9iaøo/@E`1#nr\7t~ xD:C!5홻FYjHk35Tݽ7+Z \} "
    Enjoying the preview?
    Page 1 of 1