-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

10 Machine Learning Blueprints You Should Know for Cybersecurity
By :

There are a number of text conventions used throughout this book.
Code in text
: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: “Mount the downloaded WebStorm-10*.dmg
disk image file as another disk in your system.”
A block of code is set as follows:
import pandas as pd import numpy as np import os from requests import get }
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
test_input_fn_a = bert.run_classifier.input_fn_builder( features=test_features_a, seq_length=MAX_SEQ_LENGTH, is_training=False, drop_remainder=False)
Any command-line input or output is written as follows:
pip install –r requirements.txt
Bold: Indicates a new term, an important word, or words that you see onscreen. For instance, words in menus or dialog boxes appear in bold. Here is an example: “The last column, named target, identifies the kind of network attack for every row in the data.”
Tips or important notes
Appear like this.