Cybersecurity Analytics - David J Marchette
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre79,23 €
Produit Neuf
Ou 19,81 € /mois
- Livraison à 0,01 €
- Livré entre le 13 et le 20 avril
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032401003_dbm
Nos autres offres
-
75,24 €
Produit Neuf
Ou 18,81 € /mois
- Livraison : 3,99 €
- Livré entre le 13 et le 16 avril
-
79,23 €
Produit Neuf
Ou 19,81 € /mois
- Livraison à 0,01 €
- Livré entre le 13 et le 20 avril
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032401003_dbm
-
81,38 €
Produit Neuf
Ou 20,35 € /mois
- Livraison à 0,01 €
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
-
100,46 €
Produit Neuf
Ou 25,12 € /mois
- Livraison : 5,00 €
- Livré entre le 13 et le 17 avril
Exp¿di¿ en 7 jours ouvr¿s
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Cybersecurity Analytics de David J Marchette Format Broché - Livre Littérature Générale
0 avis sur Cybersecurity Analytics de David J Marchette Format Broché - Livre Littérature Générale
Donnez votre avis et cumulez 5
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Dragon Quest 8 - Guide Stratégique Officiel
23 avis
Occasion dès 42,15 €
-
Cosaan =: Les Origines (La Civilisation Sereer) (French Edition)
Occasion dès 89,00 €
-
In The American West 40th Anniversary Edition
Neuf dès 80,00 €
Occasion dès 194,68 €
-
Animal Crossing: New Horizons Official Complete Guide
3 avis
Neuf dès 84,94 €
-
Rehab Science: How To Overcome Pain And Heal From Injury
Neuf dès 58,00 €
-
Bill Brandt: Shadow & Light
Occasion dès 63,67 €
-
Larousse Menager Illustre 1926
Occasion dès 50,00 €
-
Helen Levitt
Neuf dès 49,70 €
Occasion dès 44,00 €
-
Karsh: A Biography In Images
Neuf dès 44,20 €
Occasion dès 42,57 €
-
Medardo Rosso: The Transient Form
Occasion dès 43,95 €
-
Introduction To Linear And Matrix Algebra
Occasion dès 43,61 €
-
The Lives Of Working Class Academics
Neuf dès 43,34 €
-
The Collected Poems Of Kenneth Koch
Neuf dès 47,65 €
-
Mission To Tibet: The Extraordinary Eighteenth-Century Account Of Father Ippolito Desideri S. J.
Neuf dès 39,24 €
Occasion dès 55,99 €
-
Writing The Book Of The World
Neuf dès 43,22 €
-
The Essential Guide To Color Knitting Techniques
Occasion dès 46,53 €
-
Frederic Bazille And The Birth Of Impressionism
1 avis
Neuf dès 44,66 €
-
Rethinking Metaphysics
Neuf dès 40,13 €
-
Prosperity Without Growth
Neuf dès 37,87 €
-
Advanced Linear And Matrix Algebra
Neuf dès 72,71 €
Occasion dès 42,11 €
Produits similaires
Présentation Cybersecurity Analytics de David J Marchette Format Broché
- Livre Littérature Générale
Résumé : Preface 1 Introduction 2 What is Data Analytics? 2.1 Data Ingestion 2.2 Data Processing and Cleaning 2.3 Visualization and Exploratory Analysis 2.3.1 Scatterplots 2.4 Pattern Recognition 2.4.1 Classification 2.4.2 Clustering 2.5 Feature extraction 2.5.1 Feature Selection 2.5.2 Random Projections 2.6 Modeling 2.6.1 Model Specification 2.6.2 Model Selection and Fitting 2.7 Evaluation 2.8 Strengths and Limitations 2.8.1 The Curse of Dimensionality 3 Security: Basics and Security Analytics 3.1 Basics of Security 3.1.1 Know Thy Enemy - Attackers and Their Motivations 3.1.2 Security Goals 3.2 Mechanisms for Ensuring Security Goals 3.2.1 Confidentiality 3.2.2 Integrity 3.2.3 Availability 3.2.4 Authentication 3.2.5 Access Control 3.2.6 Accountability 3.2.7 Non-repudiation 3.3 Threats, Attacks and Impacts 3.3.1 Passwords 3.3.2 Malware 3.3.3 Spam, Phishing and its Variants 3.3.4 Intrusions 3.3.5 Internet Surfing 3.3.6 System Maintenance and Firewalls 3.3.7 Other Vulnerabilities 3.3.8 Protecting Against Attacks 3.4 Applications of Data Science to Security Challenges 3.4.1 Cybersecurity Datasets 3.4.2 Data Science Applications 3.4.3 Passwords 3.4.4 Malware 3.4.5 Intrusions 3.4.6 Spam/Phishing 3.4.7 Credit Card Fraud/Financial Fraud 3.4.8 Opinion Spam 3.4.9 Denial of Service 3.5 Security Analytics and Why Do We Need It4 Statistics 4.1 Probability Density Estimation 4.2 Models 4.2.1 Poisson 4.2.2 Uniform 4.2.3 Normal 4.3 Parameter Estimation 4.3.1 The Bias-Variance Trade-Off 4.4 The Law of Large Numbers and the Central Limit Theorem 4.5 Confidence Intervals 4.6 Hypothesis Testing 4.7 Bayesian Statistics 4.8 Regression 4.8.1 Logistic Regression 4.9 Regularization 4.10 Principal Components 4.11 Multidimensional Scaling 4.12 Procrustes 4.13 Nonparametric Statistics 4.14 Time Series 5 Data Mining - Unsupervised Learning 5.1 Data Collection 5.2 Types of Data and Operations 5.2.1 Properties of Datasets 5.3 Data Exploration and Preprocessing 5.3.1 Data Exploration 5.3.2 Data Preprocessing/Wrangling 5.4 Data Representation 5.5 Association Rule Mining 5.5.1 Variations on the Apriori Algorithm 5.6 Clustering 5.6.1 Partitional Clustering 5.6.2 Choosing K 5.6.3 Variations on K-means Algorithm 5.6.4 Hierarchical Clustering 5.6.5 Other Clustering Algorithms 5.6.6 Measuring the Clustering Quality 5.6.7 Clustering Miscellany: Clusterability, Robustness, Incremental, 5.7 Manifold Discovery 5.7.1 Spectral Embedding 5.8 Anomaly Detection 5.8.1 Statistical Methods 5.8.2 Distance-based Outlier Detection 5.8.3 kNN based approach 5.8.4 Density-based Outlier Detection 5.8.5 Clustering-based Outlier Detection 5.8.6 One-class learning based Outliers 5.9 Security Applications and Adaptations 5.9.1 Data Mining for Intrusion Detection 5.9.2 Malware Detection 5.9.3 Stepping-stone Detection 5.9.4 Malware Clustering 5.9.5 Directed Anomaly Scoring for Spear Phishing Detection 5.10 Concluding Remarks and Further Reading 6 Machine Learning - Supervised Learning 6.1 Fundamentals of Supervised Learning 6.2 The Bayes Classifier 6.2.1 Na?ve Bayes6.3 Nearest Neighbors Classifiers 6.4 Linear Classifiers 6.5 Decision Trees and Random Forests 6.5.1 Random Forest 6.6 Support Vector Machines 6.7 Semi-Supervised Classification 6.8 Neural Networks and Deep Learning 6.8.1 Perceptron 6.8.2 Neural Networks 6.8.3 Deep Networks 6.9 Topological Data Analysis 6.10 Ensemble Learning 6.10.1 Majority 6.10.2 Adaboost 6.11 One-class Learning 6.12 Online Learning 6.13 Adversarial Machine Learning 6.13.1 Adversarial Examples 6.13.2 Adversarial Training 6.13.3 Adversarial Generation 6.13.4 Beyond Continuous Data 6.14 Evaluation of Machine Learning 6.14.1 Cost-sensitive Evaluation 6.14.2 Ne...
Biographie:
..
Sommaire: Rakesh Verma is a professor of computer science at the University of Houston where he is leading a research group that applies reasoning and data science to cybersecurity challenges. He teaches a course on security analytics that includes some of the material here. Since 2015, he has been co-organizing and editing the proceedings of the ACM International Workshop on Security and Privacy Analytics. He is an editor of Frontiers of Big Data in the Cybersecurity Area, an ACM Distinguished Speaker (2011-2018), and the winner of two Best Paper Awards. He received the Lifetime Mentoring Award from the University of Houston and he is a Fulbright Senior Specialist in Computer Science. David Marchette is a principal scientist at the Naval Surface Warfare Center, Dahlgren Division where he is responsible for leading basic and applied research projects in computational statistics, graph theory, network analysis, pattern recognition, computer intrusion detection, and text analysis. He is a fellow of the American Statistical Association (ASA) and the American Association for the Advancement of Science (AAAS) and an elected member of the International Statistical Institute (ISI).
Détails de conformité du produit
Personne responsable dans l'UE