
Introduction to Machine Learning with Security
Beschreibung
Alles über E-Books | Antworten auf Fragen rund um E-Books, Kopierschutz und Dateiformate finden Sie in unserem Info- & Hilfebereich.
This book provides an introduction to machine learning, security and cloud computing, from a conceptual level, along with their usage with underlying infrastructure. The authors emphasize fundamentals and best practices for using AI and ML in a dynamic infrastructure with cloud computing and high security, preparing readers to select and make use of appropriate techniques. Important topics are demonstrated using real applications and case studies.
Weitere Details
Weitere Ausgaben
Personen
Pramod Gupta has more than 20 years of experience as a researcher and academician in various organizations including work with NASA, GE, VISA, and University of California and startups. He has a PhD from McMaster University in Electrical and Computer Engineering with specialization in Neuro-Control of Robotic Manipulators. He has more than 40 publications on these subjects. His research areas include Neural Networks, Machine Learning, Artificial Intelligence, Data Modeling and Analytics and Data mining. Presently, he is an Adjunct Faculty and working as an independent data science consultant.
Naresh K. Sehgal is a CTO at the Deeply Human AI. Before that he worked at NovaSignal for 3 years and at Intel for 31 years in various Engineering and Management roles. Naresh has earned his B.E. from Punjab Engineering College, M.S. and Ph.D. from Syracuse University. He also taught a Cloud Computing class at Santa Clara University, where he earned an MBA.
John M. Acken is a research faculty member in the Electrical and Computer Engineering Department, Portland State University, Portland, OR. John received his BS and MS in Electrical Engineering from Oklahoma State University and Ph. D. in Electrical Engineering from Stanford University. His projects include technology and devices for information security and identity authentication. John has worked as an Electrical Engineer and Manager at several companies, including the US Army, Sandia National Labs in Albuquerque, New Mexico and Intel in Santa Clara, CA. John's time in the US Army was in the Army Security Agency, a branch of NSA during the Vietnam War.
Inhalt
Introduction to Machine Learning.- Foundations of Machine Learning.- Deep Learning and cloud computing.- Cloud Computing Concepts.- Practical Aspects in Machine Learning.- Artificial Intelligence and Information Security.- Examples of Analytics in the Cloud.- A case study of Data Collection and Analytics in the Cloud.- Future trends in Hardware based AI and ML.
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.