Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Hands-On Artificial Intelligence for Cybersecurity
  • Table Of Contents Toc
  • Feedback & Rating feedback
Hands-On Artificial Intelligence for Cybersecurity

Hands-On Artificial Intelligence for Cybersecurity

By : Parisi
4.4 (5)
close
close
Hands-On Artificial Intelligence for Cybersecurity

Hands-On Artificial Intelligence for Cybersecurity

4.4 (5)
By: Parisi

Overview of this book

Today's organizations spend billions of dollars globally on cybersecurity. Artificial intelligence has emerged as a great solution for building smarter and safer security systems that allow you to predict and detect suspicious network activity, such as phishing or unauthorized intrusions. This cybersecurity book presents and demonstrates popular and successful AI approaches and models that you can adapt to detect potential attacks and protect your corporate systems. You'll learn about the role of machine learning and neural networks, as well as deep learning in cybersecurity, and you'll also learn how you can infuse AI capabilities into building smart defensive mechanisms. As you advance, you'll be able to apply these strategies across a variety of applications, including spam filters, network intrusion detection, botnet detection, and secure authentication. By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI.
Table of Contents (16 chapters)
close
close
Free Chapter
1
Section 1: AI Core Concepts and Tools of the Trade
4
Section 2: Detecting Cybersecurity Threats with AI
8
Section 3: Protecting Sensitive Information and Assets
12
Section 4: Evaluating and Testing Your AI Arsenal

Biometric authentication with facial recognition

In addition to authentication procedures using keyboard dynamics, authentication methods that use facial recognition are increasingly common.

These procedures benefit from the growing diffusion of neural networks, as well as the availability of hardware peripherals (such as embedded cameras), which come pre-installed on smartphones and tablets, PCs, and other devices.

Strange as it may seem, the idea of ​​using biometric evidence is not new and can be traced back to less recent times. While the use of fingerprints entered the field of police operations at the beginning of the last century, some basic forms of facial recognition date back to posters depicting wanted outlaws, which was very common in the Wild West, to the most recent identikits that are used by investigators.

There is no doubt, however, that in recent...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY