Introduction to machine learning with applications in information security / (Record no. 729131)

MARC details
000 -LEADER
fixed length control field 02608cam a22002058i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781032204925
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781032207179
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23/eng/20220223
Item number STA
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Stamp, Mark,
245 10 - TITLE STATEMENT
Title Introduction to machine learning with applications in information security /
Statement of responsibility, etc Mark Stamp.
250 ## - EDITION STATEMENT
Edition statement Second edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton:
Name of publisher CRC PRESS,
Year of publication 2023.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xiv, 534 p.
490 0# - SERIES STATEMENT
Series statement Chapman & Hall/CRC machine learning & pattern recognition
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc "Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, reinforced via realistic applications. The book is accessible and doesn't prove theorems, or dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts. The book covers core classic machine learning topics in depth, including Hidden Markov Models (HMM), Support Vector Machines (SVM), and clustering. Additional machine learning topics include k-Nearest Neighbor (k-NN), boosting, Random Forests, and Linear Discriminant Analysis (LDA). The fundamental deep learning topics of backpropagation, Convolutional Neural Networks (CNN), Multilayer Perceptrons (MLP), and Recurrent Neural Networks (RNN) are covered in depth. A broad range of advanced deep learning architectures are also presented, including Long Short-Term Memory (LSTM), Generative Adversarial Networks (GAN), Extreme Learning Machines (ELM), Residual Networks (ResNet), Deep Belief Networks (DBN), Bidirectional Encoder Representations from Transformers (BERT), and Word2Vec. Finally, several cutting-edge deep learning topics are discussed, including dropout regularization, attention, explainability, and adversarial attacks. Most of the examples in the book are drawn from the field of information security, with many of the machine learning and deep learning applications focused on malware. The applications presented serve to demystify the topics by illustrating the use of various learning techniques in straightforward scenarios. Some of the exercises in this book require programming, and elementary computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of computing experience should have no trouble with this aspect of the book"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Information networks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Machine learning.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home Library Current Location Shelving location Date acquired Full call number Accession Number Price effective from Koha item type
    Dewey Decimal Classification     Dept. of Futures Studies Dept. of Futures Studies General Stacks 05/06/2024 005.8 STA DFS4636 05/06/2024 Book