Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes
暫譯: 機器學習安全原則:保護數據、網絡、用戶和應用程序免受窺探

Mueller, John Paul

  • 出版商: Packt Publishing
  • 出版日期: 2022-12-30
  • 售價: $1,670
  • 貴賓價: 9.5$1,587
  • 語言: 英文
  • 頁數: 450
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 1804618853
  • ISBN-13: 9781804618851
  • 相關分類: Machine Learning資訊安全
  • 立即出貨 (庫存=1)

商品描述

Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day

Key Features

- Discover how hackers rely on misdirection and deep fakes to fool even the best security systems
- Retain the usefulness of your data by detecting unwanted and invalid modifications
- Develop application code to meet the security requirements related to machine learning

Book Description

Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning.

As you progress to the second part, you'll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references.

The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary's reputation. Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies.

This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.

By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.

What you will learn

- Explore methods to detect and prevent illegal access to your system
- Implement detection techniques when access does occur
- Employ machine learning techniques to determine motivations
- Mitigate hacker access once security is breached
- Perform statistical measurement and behavior analysis
- Repair damage to your data and applications
- Use ethical data collection methods to reduce security risks

Who this book is for

Whether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have. While most resources available on this topic are written in a language more suitable for experts, this guide presents security in an easy-to-understand way, employing a host of diagrams to explain concepts to visual learners. While familiarity with machine learning concepts is assumed, knowledge of Python and programming in general will be useful.

商品描述(中文翻譯)

阻止駭客的方式是透過預防、檢測和誤導訪問,讓他們無法植入惡意軟體、獲取憑證、從事詐騙、修改數據、毒化模型、腐蝕用戶、竊聽,並以其他方式破壞你的日常工作。

主要特點

- 發現駭客如何依賴誤導和深度偽造來欺騙即使是最好的安全系統
- 透過檢測不必要和無效的修改來保留數據的實用性
- 開發應用程式代碼以滿足與機器學習相關的安全要求

書籍描述

企業正在利用人工智慧的力量,使過去複雜且昂貴的工作變得更簡單、更快速且更便宜。本書的第一部分將更深入地探討這些過程,幫助你理解安全在機器學習中的角色。

當你進入第二部分時,你將學習到機器學習常用的環境,並深入探討這些環境所面臨的安全威脅,使用代碼、圖形和現實世界的參考。

本書的下一部分將指導你如何在現代計算環境中檢測駭客行為,詐騙在機器學習中以多種形式出現,從透過虛假評論獲得銷售到摧毀對手的聲譽。一旦你理解了駭客的目標和檢測技術,你將學習到深度偽造的影響,隨後是緩解策略。

本書還將帶你了解擁抱道德數據來源的最佳實踐,這可以降低與數據相關的安全風險。你將看到,簡單地從數據集中移除個人可識別信息(PII)的行為如何降低社會工程攻擊的風險。

在這本機器學習書籍的結尾,你將對各種攻擊及有效保護你的機器學習系統的技術有更深的認識。

你將學到的內容

- 探索檢測和防止非法訪問系統的方法
- 當訪問發生時實施檢測技術
- 使用機器學習技術來確定動機
- 一旦安全被突破,減輕駭客訪問的影響
- 執行統計測量和行為分析
- 修復數據和應用程式的損壞
- 使用道德數據收集方法來降低安全風險

本書適合誰

無論你是數據科學家、研究人員,還是從事機器學習技術的管理者,這本安全書籍都是必備的。雖然大多數關於這個主題的資源都是用更適合專家的語言撰寫,但本指南以易於理解的方式呈現安全,並使用大量圖表來解釋概念,適合視覺學習者。雖然假設你對機器學習概念有一定的熟悉度,但對Python和一般編程的知識將會很有幫助。

目錄大綱

1. Defining Machine Learning Security
2. Mitigating Risk at Training by Validating and Maintaining Datasets
3. Mitigating Inference Risk by Avoiding Adversarial Machine Learning Attacks
4. Considering the Threat Environment
5. Keeping Your Network Clean
6. Detecting and Analyzing Anomalies
7. Dealing with Malware
8. Locating Potential Fraud
9. Defending against Hackers
10. Considering the Ramifications of Deepfakes
11. Leveraging Machine Learning against Hacking
12. Embracing and Incorporating Ethical Behavior

目錄大綱(中文翻譯)

1. Defining Machine Learning Security

2. Mitigating Risk at Training by Validating and Maintaining Datasets

3. Mitigating Inference Risk by Avoiding Adversarial Machine Learning Attacks

4. Considering the Threat Environment

5. Keeping Your Network Clean

6. Detecting and Analyzing Anomalies

7. Dealing with Malware

8. Locating Potential Fraud

9. Defending against Hackers

10. Considering the Ramifications of Deepfakes

11. Leveraging Machine Learning against Hacking

12. Embracing and Incorporating Ethical Behavior