March 14, 2020

452 words 3 mins read

PacktPublishing/Hands-On-Artificial-Intelligence-for-Cybersecurity

PacktPublishing/Hands-On-Artificial-Intelligence-for-Cybersecurity

Hands-On Artificial Intelligence for Cybersecurity, publised by Packt

repo name PacktPublishing/Hands-On-Artificial-Intelligence-for-Cybersecurity
repo link https://github.com/PacktPublishing/Hands-On-Artificial-Intelligence-for-Cybersecurity
homepage
language Jupyter Notebook
size (curr.) 1293 kB
stars (curr.) 8
created 2019-07-24
license MIT License

Hands-On Artificial Intelligence for Cybersecurity

This is the code repository for Hands-On Artificial Intelligence for Cybersecurity, published by Packt.

Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

What is this book about?

If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.

This book covers the following exciting features:

  • Detect email threats such as spamming and phishing using AI
  • Categorize APT, zero-days, and polymorphic malware samples
  • Overcome antivirus limits in threat detection
  • Predict network intrusions and detect anomalies with machine learning
  • Verify the strength of biometric authentication procedures with deep learning

If you feel this book is for you, get your copy today!

Instructions and Navigations

All of the code is organized into folders. For example,

The code will look like the following:

In [ ]:
from sklearn.decomposition import PCA   

pca = PCA(n_components=2)               
pca.fit(X_data)                         
X_2D = pca.transform(X_data)            
data_df['PCA1'] = X_2D[:, 0]
data_df['PCA2'] = X_2D[:, 1]

Following is what you need for this book: If you’re a cybersecurity professional or ethical hacker who wants to build intelligent systems using the power of machine learning and AI, you’ll find this book useful. Familiarity with cybersecurity concepts and knowledge of Python programming is essential to get the most out of this book.

With the following software and hardware list you can run all code files present in the book (Chapter 1-11).

Software and Hardware List

Chapter Software required OS required
1-10 Python 3.7, Jupyter Notebook Windows, Mac OS X, and Linux (Any)
7 Python 3.7, Jupyter Notebook, IBM Watson Windows, Mac OS X, and Linux (Any)

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. Click here to download it.

Get to Know the Author

Alessandro Parisi has been an IT professional for over 20 years, acquiring significant experience as a security data scientist, and as an AI cybersecurity and blockchain specialist. He has experience of operating within organizational and decisional contexts characterized by high complexity. Over the years, he has helped companies to adopt AI and blockchain DLT technologies as strategic tools in protecting sensitive corporate assets. He holds an MSc in economics and statistics.

Suggestions and Feedback

Click here if you have any feedback or suggestions.

comments powered by Disqus