Machine Learning for Cybersecurity Cookbook Over 80 recipes on how to implement machine learning algorithms for building security systems using Python 1st edition by Emmanuel Tsukerman- Ebook PDF Instant Download/Delivery.9781838556341, 1838556346
Full download Machine Learning for Cybersecurity Cookbook Over 80 recipes on how to implement machine learning algorithms for building security systems using Python 1st edition after payment
Product details:
ISBN 10: 1838556346
ISBN 13: 9781838556341
Author: Emmanuel Tsukerman
Machine Learning for Cybersecurity Cookbook Over 80 recipes on how to implement machine learning algorithms for building security systems using Python 1st Table of contents:
Who this book is for
What this book covers
To get the most out of this book
Download the example code files
Download the color images
Conventions used
Sections
Getting ready
How to do it…
How it works…
There’s more…
See also
Get in touch
Reviews
Machine Learning for Cybersecurity
Technical requirements
Train-test-splitting your data
Getting ready
How to do it…
How it works…
Standardizing your data
Getting ready
How to do it…
How it works…
Summarizing large data using principal component analysis
Getting ready
How to do it…
How it works…
Generating text using Markov chains
Getting ready
How to do it…
How it works…
Performing clustering using scikit-learn
Getting ready
How to do it…
How it works…
Training an XGBoost classifier
Getting ready
How to do it…
How it works…
Analyzing time series using statsmodels
Getting ready
How to do it…
How it works…
Anomaly detection with Isolation Forest
Getting ready
How to do it…
How it works…
Natural language processing using a hashing vectorizer and tf-idf with scikit-learn
Getting ready
How to do it…
How it works…
Hyperparameter tuning with scikit-optimize
Getting ready
How to do it…
How it works…
Machine Learning-Based Malware Detection
Technical requirements
Malware static analysis
Computing the hash of a sample
Getting ready
How to do it…
How it works…
YARA
Getting ready
How to do it…
How it works…
Examining the PE header
Getting ready
How to do it…
How it works…
Featurizing the PE header
Getting ready
How to do it…
How it works…
Malware dynamic analysis
Getting ready
How to do it…
How it works…
Using machine learning to detect the file type
Scraping GitHub for files of a specific type
Getting ready
How to do it…
How it works…
Classifying files by type
Getting ready
How to do it…
How it works…
Measuring the similarity between two strings
Getting ready
How to do it…
How it works…
Measuring the similarity between two files
Getting ready
How to do it…
How it works…
Extracting N-grams
Getting ready
How to do it…
How it works…
Selecting the best N-grams
Getting ready
How to do it…
How it works…
Building a static malware detector
Getting ready
How to do it…
How it works…
Tackling class imbalance
Getting ready
How to do it…
How it works…
Handling type I and type II errors
Getting ready
How to do it…
How it works…
Advanced Malware Detection
Technical requirements
Detecting obfuscated JavaScript
Getting ready
How to do it…
How it works…
Featurizing PDF files
Getting ready
How to do it…
How it works…
Extracting N-grams quickly using the hash-gram algorithm
Getting ready
How to do it…
How it works…
See also
Building a dynamic malware classifier
Getting ready
How to do it…
How it works…
MalConv – end-to-end deep learning for malicious PE detection
Getting ready
How to do it…
How it works…
Tackling packed malware
Using packers
Getting ready
How to do it…
How it works…
Assembling a packed sample dataset
Getting ready
How to do it…
How it works…
Building a classifier for packers
Getting ready
How to do it…
How it works…
MalGAN – creating evasive malware
Getting ready
How to do it…
How it works…
Tracking malware drift
Getting ready
How to do it…
How it works…
Machine Learning for Social Engineering
Technical requirements
Twitter spear phishing bot
Getting ready
How to do it…
How it works…
Voice impersonation
Getting ready
How to do it…
How it works…
Speech recognition for OSINT
Getting ready
How to do it…
How it works…
Facial recognition
Getting ready
How to do it…
How it works…
Deepfake
Getting ready
How to do it…
How it works…
Deepfake recognition
Getting ready
How to do it…
How it works…
Lie detection using machine learning
Getting ready
How to do it…
How it works…
Personality analysis
Getting ready
How to do it…
How it works…
Social Mapper
Getting ready
How to do it…
How it works…
Fake review generator
Training a fake review generator
Getting ready
How to do it…
How it works…
Generating fake reviews
Getting ready
How to do it…
How it works…
Fake news
Getting ready
How to do it…
How it works…
Penetration Testing Using Machine Learning
Technical requirements
CAPTCHA breaker
Processing a CAPTCHA dataset
Getting ready
How to do it…
How it works…
Training a CAPTCHA solver neural network
Getting ready
How to do it…
How it works…
Neural network-assisted fuzzing
Getting ready
How to do it…
How it works…
DeepExploit
Getting ready
How to do it…
How it works…
Web server vulnerability scanner using machine learning (GyoiThon)
Getting ready
How to do it…
How it works…
Deanonymizing Tor using machine learning
Getting ready
How to do it…
Collecting data
Training
Predicting
How it works…
IoT device type identification using machine learning
Getting ready
How to do it…
How it works…
Keystroke dynamics
Getting ready
How to do it…
How it works…
Malicious URL detector
Getting ready
How to do it…
How it works…
Deep-pwning
Getting ready
How to do it…
How it works…
Deep learning-based system for the automatic detection of software vulnerabilities
Getting ready
How to do it…
How it works…
Automatic Intrusion Detection
Technical requirements
Spam filtering using machine learning
Getting ready
How to do it…
How it works…
Phishing URL detection
Getting ready
How to do it…
How it works…
Capturing network traffic
Getting ready
How to do it…
How it works…
Network behavior anomaly detection
Getting ready
How to do it…
How it works…
Botnet traffic detection
Getting ready
How to do it…
How it works…
Insider threat detection
Feature engineering for insider threat detection
Getting ready
How to do it…
How it works…
Employing anomaly detection for insider threats
Getting ready
How to do it…
How it works…
Detecting DDoS
Getting ready
How to do it…
How it works…
Credit card fraud detection
Getting ready
How to do it…
How it works…
Counterfeit bank note detection
Getting ready
How to do it…
How it works…
Ad blocking using machine learning
Getting ready
How to do it…
How it works…
Wireless indoor localization
Getting ready
How to do it…
How it works…
Securing and Attacking Data with Machine Learning
Technical requirements
Assessing password security using ML
Getting ready
How to do it…
How it works…
Deep learning for password cracking
Getting ready
How to do it…
How it works…
There’s more
Deep steganography
Getting ready
How to do it…
How it works…
ML-based steganalysis
Getting ready
How to do it…
How it works…
ML attacks on PUFs
Getting ready
How to do it…
How it works…
There’s more
Encryption using deep learning
Getting ready
How to do it…
How it works…
HIPAA data breaches – data exploration and visualization
Getting ready
How to do it…
How it works…
Secure and Private AI
Technical requirements
Federated learning
Getting ready
How to do it…
How it works…
Encrypted computation
Getting ready
How to do it…
How it works…
Private deep learning prediction
Getting ready
How to do it…
How it works…
Testing the adversarial robustness of neural networks
Getting ready
How to do it…
How it works…
Differential privacy using TensorFlow Privacy
Getting ready
How to do it…
How it works…
Appendix
Setting up a virtual lab environment
Getting ready
How to do it…
How it works…
Using Python virtual environments
Getting ready
How to do it…
How it works…
Other Books You May Enjoy
Leave a review – let other readers know what you think
People also search for Machine Learning for Cybersecurity Cookbook Over 80 recipes on how to implement machine learning algorithms for building security systems using Python 1st :
machine learning for cybersecurity cookbook over 80 recipes
machine learning for cybersecurity cookbook
machine learning cookbook
machine learning with python cookbook 2nd edition