Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - Machine learning. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Machine$002blearning.$002509Machine$002blearning.$0026ps$003d300? 2024-06-05T23:37:25Z Generative malware outbreak detection ent://SD_ILS/0/SD_ILS:2325158 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Park, Sean, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar">https://go.oreilly.com/library-access/library/view/-/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452/?ar">https://learning.oreilly.com/videos/~/0636920373452/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920373452">https://learning.oreilly.com/videos/~/0636920373452</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning et s&eacute;curit&eacute; ent://SD_ILS/0/SD_ILS:2326075 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar">https://go.oreilly.com/library-access/library/view/-/9782412043561/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9782412043561">https://learning.oreilly.com/library/view/~/9782412043561</a> <a href="https://learning.oreilly.com/library/view/~/9782412043561/?ar">https://learning.oreilly.com/library/view/~/9782412043561/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies ent://SD_ILS/0/SD_ILS:2321510 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Parisi, Alessandro, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar">https://go.oreilly.com/library-access/library/view/-/9781789804027/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789804027">https://learning.oreilly.com/library/view/~/9781789804027</a> <a href="https://learning.oreilly.com/library/view/~/9781789804027/?ar">https://learning.oreilly.com/library/view/~/9781789804027/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fraud detection without feature engineering ent://SD_ILS/0/SD_ILS:2322434 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/> Security with AI and machine learning : using advanced tools to improve application security at the edge ent://SD_ILS/0/SD_ILS:2319058 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Gil, Laurent, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar">https://go.oreilly.com/library-access/library/view/-/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133/?ar">https://learning.oreilly.com/library/view/~/9781492043133/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492043133">https://learning.oreilly.com/library/view/~/9781492043133</a><br/>Format:&#160;Electronic Resources<br/> Machine learning and security : protecting systems with data and algorithms ent://SD_ILS/0/SD_ILS:2315881 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem ent://SD_ILS/0/SD_ILS:2318588 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Halder, Soma, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar">https://go.oreilly.com/library-access/library/view/-/9781788992282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788992282/?ar">https://learning.oreilly.com/library/view/~/9781788992282/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781788992282">https://learning.oreilly.com/library/view/~/9781788992282</a><br/>Format:&#160;Electronic Resources<br/> Data Mining and Machine Learning in Cybersecurity ent://SD_ILS/0/SD_ILS:2313557 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Dua, Sumeet, author<br/><a href="https://learning.oreilly.com/library/view/~/9781439839430/?ar">https://learning.oreilly.com/library/view/~/9781439839430/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar">https://go.oreilly.com/library-access/library/view/-/9781439839430/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439839430">https://learning.oreilly.com/library/view/~/9781439839430</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning Forensics for Law Enforcement, Security, and Intelligence ent://SD_ILS/0/SD_ILS:2313563 2024-06-05T23:37:25Z 2024-06-05T23:37:25Z by&#160;Mena, Jesus, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar">https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439860700">https://learning.oreilly.com/library/view/~/9781439860700</a> <a href="https://learning.oreilly.com/library/view/~/9781439860700/?ar">https://learning.oreilly.com/library/view/~/9781439860700/?ar</a><br/>Format:&#160;Electronic Resources<br/>