000 -LEADER | |
---|---|
fixed length control field | nam a22 7a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180727b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781138626782 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Item number | STA |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stamp, Mark |
245 ## - TITLE STATEMENT | |
Title | Introduction to machine learning with applications in information security |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | CRC Press, |
Date of publication, distribution, etc | 2018 |
Place of publication, distribution, etc | Boca Raton: |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xiv, 345 p. : |
Other physical details | ill.; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price type code | GBP |
Price amount | 49.99 |
520 ## - SUMMARY, ETC. | |
Summary, etc | Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn’t prove theorems, or otherwise dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts. The book covers core machine learning topics in-depth, including Hidden Markov Models, Principal Component Analysis, Support Vector Machines, and Clustering. It also includes coverage of Nearest Neighbors, Neural Networks, Boosting and AdaBoost, Random Forests, Linear Discriminant Analysis, Vector Quantization, Naive Bayes, Regression Analysis, Conditional Random Fields, and Data Analysis. Most of the examples in the book are drawn from the field of information security, with many of the machine learning applications specifically focused on malware. The applications presented are designed to demystify machine learning techniques by providing straightforward scenarios. Many of the exercises in this book require some programming, and basic computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of programming experience should have no trouble with this aspect of the book. Instructor resources, including PowerPoint slides, lecture videos, and other relevant material are provided on an accompanying website: http://www.cs.sjsu.edu/~stamp/ML/. For the reader’s benefit, the figures in the book are also available in electronic form, and in color. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Machine Learning |
Topical term or geographic name as entry element | Dynamic Programming |
Topical term or geographic name as entry element | Scaling |
Topical term or geographic name as entry element | Markov Models |
Topical term or geographic name as entry element | PHMM |
Topical term or geographic name as entry element | MSA |
Topical term or geographic name as entry element | Neural Networks |
Topical term or geographic name as entry element | Linear Discriminant Analysis |
Topical term or geographic name as entry element | Data Analysis |
Topical term or geographic name as entry element | ROC Curves |
Topical term or geographic name as entry element | Malware |
Topical term or geographic name as entry element | Spam |
Topical term or geographic name as entry element | HMM Applications |
Topical term or geographic name as entry element | Classic Cryptanalysis |
Topical term or geographic name as entry element | PR Curves |
Topical term or geographic name as entry element | Clustering |
Topical term or geographic name as entry element | Principal Component Analysis |
Topical term or geographic name as entry element | Quadratic Programming |
Topical term or geographic name as entry element | SVD |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent location | Current location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Total Renewals | Full call number | Barcode | Date last seen | Date last borrowed | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
DAIICT | DAIICT | 2018-07-27 | Kushal Books | 4699.06 | 4 | 2 | 004.6 STA | 031604 | 2022-05-16 | 2021-01-05 | Books |