Please share your thoughts on this book with others by leaving a review on the site that you bought it from. If you purchased the book from Amazon, please leave us an honest review on this book's Amazon page. This is vital so that other potential readers can see and use your unbiased opinion to make purchasing decisions, we can understand what our customers think about our products, and our authors can see your feedback on the title that they have worked with Packt to create. It will only take a few minutes of your time, but is valuable to other potential customers, our authors, and Packt. Thank you!
Hands-On Artificial Intelligence for Cybersecurity
By :
Hands-On Artificial Intelligence for Cybersecurity
By:
Overview of this book
Today's organizations spend billions of dollars globally on cybersecurity. Artificial intelligence has emerged as a great solution for building smarter and safer security systems that allow you to predict and detect suspicious network activity, such as phishing or unauthorized intrusions.
This cybersecurity book presents and demonstrates popular and successful AI approaches and models that you can adapt to detect potential attacks and protect your corporate systems. You'll learn about the role of machine learning and neural networks, as well as deep learning in cybersecurity, and you'll also learn how you can infuse AI capabilities into building smart defensive mechanisms. As you advance, you'll be able to apply these strategies across a variety of applications, including spam filters, network intrusion detection, botnet detection, and secure authentication.
By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI.
Table of Contents (16 chapters)
Preface
Free Chapter
Section 1: AI Core Concepts and Tools of the Trade
Introduction to AI for Cybersecurity Professionals
Setting Up Your AI for Cybersecurity Arsenal
Section 2: Detecting Cybersecurity Threats with AI
Ham or Spam? Detecting Email Cybersecurity Threats with AI
Malware Threat Detection
Network Anomaly Detection with AI
Section 3: Protecting Sensitive Information and Assets
Securing User Authentication
Fraud Prevention with Cloud AI Solutions
GANs - Attacks and Defenses
Section 4: Evaluating and Testing Your AI Arsenal
Evaluating Algorithms
Assessing your AI Arsenal
Other Books You May Enjoy
Customer Reviews