مكتبة جامعة عجلون الوطنية

فهرس بحث المكتبة

Introduction to machine learning with applications in information security / (Record no. 33794)

MARC details
000 -LEADER
fixed length control field 03238cam a22003858i 4500
001 - CONTROL NUMBER
control field 22425912
003 - CONTROL NUMBER IDENTIFIER
control field JO-AjAnu
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241020101451.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220216s2023 flu b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2022007073
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032204925
Qualifying information (hbk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032207179
Qualifying information (pbk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781003264873
Qualifying information (ebk)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency JO-AjAnu
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .S735 2023
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23/eng/20220223
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stamp, Mark,
Relator term author.
245 10 - TITLE STATEMENT
Title Introduction to machine learning with applications in information security /
Statement of responsibility, etc. Mark Stamp.
250 ## - EDITION STATEMENT
Edition statement Second edition.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2208
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice [2023]
300 ## - PHYSICAL DESCRIPTION
Extent pages cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Chapman & Hall/CRC machine learning & pattern recognition
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, reinforced via realistic applications. The book is accessible and doesn't prove theorems, or dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts. The book covers core classic machine learning topics in depth, including Hidden Markov Models (HMM), Support Vector Machines (SVM), and clustering. Additional machine learning topics include k-Nearest Neighbor (k-NN), boosting, Random Forests, and Linear Discriminant Analysis (LDA). The fundamental deep learning topics of backpropagation, Convolutional Neural Networks (CNN), Multilayer Perceptrons (MLP), and Recurrent Neural Networks (RNN) are covered in depth. A broad range of advanced deep learning architectures are also presented, including Long Short-Term Memory (LSTM), Generative Adversarial Networks (GAN), Extreme Learning Machines (ELM), Residual Networks (ResNet), Deep Belief Networks (DBN), Bidirectional Encoder Representations from Transformers (BERT), and Word2Vec. Finally, several cutting-edge deep learning topics are discussed, including dropout regularization, attention, explainability, and adversarial attacks. Most of the examples in the book are drawn from the field of information security, with many of the machine learning and deep learning applications focused on malware. The applications presented serve to demystify the topics by illustrating the use of various learning techniques in straightforward scenarios. Some of the exercises in this book require programming, and elementary computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of computing experience should have no trouble with this aspect of the book"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Machine learning.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Library of Congress Classification     مكتبة جامعة عجلون الوطنية مكتبة جامعة عجلون الوطنية 20/10/2024   TK5105.59.S735 2023 e3963 20/10/2024 20/10/2024 Books
    Library of Congress Classification     مكتبة جامعة عجلون الوطنية مكتبة جامعة عجلون الوطنية 20/10/2024   TK5105.59.S735 2023 e3964 20/10/2024 20/10/2024 Books