Introduction to machine learning with applications in information security (Record no. 29100)

000 -LEADER
fixed length control field nam a22 7a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180727b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781138626782
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Item number STA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Stamp, Mark
245 ## - TITLE STATEMENT
Title Introduction to machine learning with applications in information security
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc 2018
Place of publication, distribution, etc Boca Raton:
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 345 p. :
Other physical details ill.;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price type code GBP
Price amount 49.99
520 ## - SUMMARY, ETC.
Summary, etc Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn’t prove theorems, or otherwise dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts.

The book covers core machine learning topics in-depth, including Hidden Markov Models, Principal Component Analysis, Support Vector Machines, and Clustering. It also includes coverage of Nearest Neighbors, Neural Networks, Boosting and AdaBoost, Random Forests, Linear Discriminant Analysis, Vector Quantization, Naive Bayes, Regression Analysis, Conditional Random Fields, and Data Analysis.

Most of the examples in the book are drawn from the field of information security, with many of the machine learning applications specifically focused on malware. The applications presented are designed to demystify machine learning techniques by providing straightforward scenarios. Many of the exercises in this book require some programming, and basic computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of programming experience should have no trouble with this aspect of the book.

Instructor resources, including PowerPoint slides, lecture videos, and other relevant material are provided on an accompanying website: http://www.cs.sjsu.edu/~stamp/ML/. For the reader’s benefit, the figures in the book are also available in electronic form, and in color.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Machine Learning
Topical term or geographic name as entry element Dynamic Programming
Topical term or geographic name as entry element Scaling

Topical term or geographic name as entry element Markov Models

Topical term or geographic name as entry element PHMM
Topical term or geographic name as entry element MSA
Topical term or geographic name as entry element Neural Networks
Topical term or geographic name as entry element Linear Discriminant Analysis
Topical term or geographic name as entry element Data Analysis
Topical term or geographic name as entry element ROC Curves
Topical term or geographic name as entry element Malware

Topical term or geographic name as entry element Spam
Topical term or geographic name as entry element HMM Applications
Topical term or geographic name as entry element Classic Cryptanalysis
Topical term or geographic name as entry element PR Curves
Topical term or geographic name as entry element Clustering
Topical term or geographic name as entry element Principal Component Analysis
Topical term or geographic name as entry element Quadratic Programming

Topical term or geographic name as entry element SVD
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2018-07-27 Kushal Books 4699.06 4 2 004.6 STA 031604 2022-05-16 2021-01-05 Books

Powered by Koha