Movatterモバイル変換


[0]ホーム

URL:


Packt
Search iconClose icon
Search icon CANCEL
Subscription
0
Cart icon
Your Cart(0 item)
Close icon
You have no products in your basket yet
Save more on your purchases!discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Profile icon
Account
Close icon

Change country

Modal Close icon
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timerSALE ENDS IN
0Days
:
00Hours
:
00Minutes
:
00Seconds
Home> Data> Machine Learning> Machine Learning Security Principles
Machine Learning Security Principles
Machine Learning Security Principles

Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes

Arrow left icon
Profile Icon John Paul Mueller
Arrow right icon
$44.99
Full star iconFull star iconFull star iconFull star iconHalf star icon4.4(8 Ratings)
AudiobookDec 20228hrs 53mins1st Edition
eBook
$33.99 $37.99
Paperback
$46.99
Audiobook
$44.99
Subscription
Free Trial
Renews at $19.99p/m
eBook
$33.99 $37.99
Paperback
$46.99
Audiobook
$44.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files(MP3) and a supplementary PDF
Product feature icon Access this title in our online player
Product feature iconDRM FREE - Listen whenever, wherever and however you want
OR

Contact Details

Modal Close icon
Payment Processing...
tickCompleted

Billing Address

Table of content iconView table of contentsDownload code iconDownload Code

Key benefits

  • Discover how hackers rely on misdirection and deep fakes to fool even the best security systems
  • Retain the usefulness of your data by detecting unwanted and invalid modifications
  • Develop application code to meet the security requirements related to machine learning

Description

Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning.As you progress to the second part, you’ll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references.The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary’s reputation. Once you’ve understood hacker goals and detection techniques, you’ll learn about the ramifications of deep fakes, followed by mitigation strategies.This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You’ll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.

Who is this book for?

Whether you’re a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have. While most resources available on this topic are written in a language more suitable for experts, this guide presents security in an easy-to-understand way, employing a host of diagrams to explain concepts to visual learners. While familiarity with machine learning concepts is assumed, knowledge of Python and programming in general will be useful.

What you will learn

  • Explore methods to detect and prevent illegal access to your system
  • Implement detection techniques when access does occur
  • Employ machine learning techniques to determine motivations
  • Mitigate hacker access once security is breached
  • Perform statistical measurement and behavior analysis
  • Repair damage to your data and applications
  • Use ethical data collection methods to reduce security risks

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date :Dec 30, 2022
Length:8hrs 53mins
Edition :1st
Language :English
ISBN-13 :9781805124788
Vendor :
Google
Category :
Languages :

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files(MP3) and a supplementary PDF
Product feature icon Access this title in our online player
Product feature iconDRM FREE - Listen whenever, wherever and however you want
OR

Contact Details

Modal Close icon
Payment Processing...
tickCompleted

Billing Address

Product Details

Publication date :Dec 30, 2022
Length:8hrs 53mins
Edition :1st
Language :English
ISBN-13 :9781805124788
Vendor :
Google
Category :
Languages :
Concepts :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99billed monthly
Feature tick iconUnlimited access to Packt's library of 7,000+ practical books and videos
Feature tick iconConstantly refreshed with 50+ new titles a month
Feature tick iconExclusive Early access to books as they're written
Feature tick iconSolve problems while you work with advanced search and reference features
Feature tick iconOffline reading on the mobile app
Feature tick iconSimple pricing, no contract
$199.99billed annually
Feature tick iconUnlimited access to Packt's library of 7,000+ practical books and videos
Feature tick iconConstantly refreshed with 50+ new titles a month
Feature tick iconExclusive Early access to books as they're written
Feature tick iconSolve problems while you work with advanced search and reference features
Feature tick iconOffline reading on the mobile app
Feature tick iconChoose a DRM-free eBook or Video every month to keep
Feature tick iconPLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick iconExclusive print discounts
$279.99billed in 18 months
Feature tick iconUnlimited access to Packt's library of 7,000+ practical books and videos
Feature tick iconConstantly refreshed with 50+ new titles a month
Feature tick iconExclusive Early access to books as they're written
Feature tick iconSolve problems while you work with advanced search and reference features
Feature tick iconOffline reading on the mobile app
Feature tick iconChoose a DRM-free eBook or Video every month to keep
Feature tick iconPLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick iconExclusive print discounts

Frequently bought together


Machine Learning Techniques for Text
Machine Learning Techniques for Text
Read more
Oct 2022448 pages
Full star icon4.8 (6)
eBook
eBook
$33.99$37.99
$46.99
Machine Learning Security Principles
Machine Learning Security Principles
Read more
Dec 2022450 pages
Full star icon4.4 (8)
eBook
eBook
$33.99$37.99
$46.99
$44.99
Machine Learning Model Serving Patterns and Best Practices
Machine Learning Model Serving Patterns and Best Practices
Read more
Dec 2022336 pages
Full star icon4.6 (14)
eBook
eBook
$29.99$33.99
$41.99
Stars icon
Total$135.97
Machine Learning Techniques for Text
$46.99
Machine Learning Security Principles
$46.99
Machine Learning Model Serving Patterns and Best Practices
$41.99
Total$135.97Stars icon

Table of Contents

18 Chapters
Part 1 – Securing a Machine Learning SystemChevron down iconChevron up icon
Part 1 – Securing a Machine Learning System
Chapter 1: Defining Machine Learning SecurityChevron down iconChevron up icon
Chapter 1: Defining Machine Learning Security
Building a picture of ML
Adding security to ML
Setting up for the book
Summary
Chapter 2: Mitigating Risk at Training by Validating and Maintaining DatasetsChevron down iconChevron up icon
Chapter 2: Mitigating Risk at Training by Validating and Maintaining Datasets
Technical requirements
Defining dataset threats
Detecting dataset modification
Mitigating dataset corruption
Summary
Chapter 3: Mitigating Inference Risk by Avoiding Adversarial Machine Learning AttacksChevron down iconChevron up icon
Chapter 3: Mitigating Inference Risk by Avoiding Adversarial Machine Learning Attacks
Defining adversarial ML
Considering security issues in ML algorithms
Describing the most common attack techniques
Mitigating threats to the algorithm
Summary
Further reading
Part 2 – Creating a Secure System Using MLChevron down iconChevron up icon
Part 2 – Creating a Secure System Using ML
Chapter 4: Considering the Threat EnvironmentChevron down iconChevron up icon
Chapter 4: Considering the Threat Environment
Technical requirements
Defining an environment
Understanding business threats
Considering social threats
Employing ML in security in the real world
Summary
Further reading
Chapter 5: Keeping Your Network CleanChevron down iconChevron up icon
Chapter 5: Keeping Your Network Clean
Technical requirements
Defining current network threats
Considering traditional protections
Adding ML to the mix
Creating real-time defenses
Developing predictive defenses
Summary
Chapter 6: Detecting and Analyzing AnomaliesChevron down iconChevron up icon
Chapter 6: Detecting and Analyzing Anomalies
Technical requirements
Defining anomalies
Detecting data anomalies
Using anomaly detection effectively in ML
Considering other mitigation techniques
Summary
Further reading
Chapter 7: Dealing with MalwareChevron down iconChevron up icon
Chapter 7: Dealing with Malware
Technical requirements
Defining malware
Generating malware detection features
Classifying malware
Summary
Further reading
Chapter 8: Locating Potential FraudChevron down iconChevron up icon
Chapter 8: Locating Potential Fraud
Technical requirements
Understanding the types of fraud
Defining fraud sources
Considering fraud that occurs in the background
Considering fraud that occurs in real time
Building a fraud detection example
Summary
Further reading
Chapter 9: Defending against HackersChevron down iconChevron up icon
Chapter 9: Defending against Hackers
Technical requirements
Considering hacker targets
Defining hacker goals
Monitoring and alerting
Improving security and reliability
Summary
Further reading
Part 3 – Protecting against ML-Driven AttacksChevron down iconChevron up icon
Part 3 – Protecting against ML-Driven Attacks
Chapter 10: Considering the Ramifications of DeepfakesChevron down iconChevron up icon
Chapter 10: Considering the Ramifications of Deepfakes
Technical requirements
Defining a deepfake
Creating a deepfake computer setup
Understanding autoencoders
Understanding CNNs and implementing GANs
Summary
Further reading
Chapter 11: Leveraging Machine Learning for HackingChevron down iconChevron up icon
Chapter 11: Leveraging Machine Learning for Hacking
Making attacks automatic and personalized
Enhancing existing capabilities
Summary
Further reading
Part 4 – Performing ML Tasks in an Ethical MannerChevron down iconChevron up icon
Part 4 – Performing ML Tasks in an Ethical Manner
Chapter 12: Embracing and Incorporating Ethical BehaviorChevron down iconChevron up icon
Chapter 12: Embracing and Incorporating Ethical Behavior
Technical requirements
Sanitizing data correctly
Defining data source awareness
Understanding ML fairness
Addressing fairness concerns
Mitigating privacy risks using federated learning and differential privacy
Summary
Further reading
IndexChevron down iconChevron up icon
Index
Why subscribe?
Other Books You May EnjoyChevron down iconChevron up icon
Other Books You May Enjoy
Packt is searching for authors like you
Share Your Thoughts
Download a free PDF copy of this book

Recommendations for you

Left arrow icon
LLM Engineer's Handbook
LLM Engineer's Handbook
Read more
Oct 2024522 pages
Full star icon4.9 (28)
eBook
eBook
$47.99
$59.99
Getting Started with Tableau 2018.x
Getting Started with Tableau 2018.x
Read more
Sep 2018396 pages
Full star icon4 (3)
eBook
eBook
$38.99$43.99
$54.99
Python for Algorithmic Trading Cookbook
Python for Algorithmic Trading Cookbook
Read more
Aug 2024404 pages
Full star icon4.2 (20)
eBook
eBook
$42.99$47.99
$59.99
RAG-Driven Generative AI
RAG-Driven Generative AI
Read more
Sep 2024338 pages
Full star icon4.3 (18)
eBook
eBook
$31.99$35.99
$43.99
Machine Learning with PyTorch and Scikit-Learn
Machine Learning with PyTorch and Scikit-Learn
Read more
Feb 2022774 pages
Full star icon4.4 (96)
eBook
eBook
$38.99$43.99
$54.99
$79.99
Building LLM Powered  Applications
Building LLM Powered Applications
Read more
May 2024342 pages
Full star icon4.2 (22)
eBook
eBook
$35.98$39.99
$49.99
Python Machine Learning By Example
Python Machine Learning By Example
Read more
Jul 2024518 pages
Full star icon4.9 (9)
eBook
eBook
$24.99$36.99
$35.99$45.99
AI Product Manager's Handbook
AI Product Manager's Handbook
Read more
Nov 2024488 pages
eBook
eBook
$31.99$35.99
$44.99
Right arrow icon

Customer reviews

Top Reviews
Rating distribution
Full star iconFull star iconFull star iconFull star iconHalf star icon4.4
(8 Ratings)
5 star50%
4 star37.5%
3 star12.5%
2 star0%
1 star0%
Filter icon Filter
Top Reviews

Filter reviews by




AdaobiMar 12, 2023
Full star iconFull star iconFull star iconFull star iconFull star icon5
Machine Learning Security Principles is so much more than a book about security. It is a training manual on how to be responsible with data in a world where everyone is incorporating ML into every aspect of their business without truly understanding what ML is or how to use it effectively.ML has made mundane tasks so much more efficient and easier to process, but has in many ways has left organizations and the data they have vulnerable to hackers. John Mueller's expertise in AI, security, and programming makes him a great go-to source for understanding what ML is, learning how to secure your organization's data and make your network less vulnerable to attacks, and figuring out whether you are dealing with fraud. He even seals it all by showing you how to be ethically responsible when building your ML applications so that you're not holding on to such extremely sensitive data in the first place.This book is and informative and important read for anyone working with ML systems and emphasizes the importance of safeguarding those systems.
Amazon Verified reviewAmazon
Disesdi Susanna CoxMar 16, 2023
Full star iconFull star iconFull star iconFull star iconFull star icon5
As an industry practitioner working in the machine learning security space, I found this to be a fantastic introduction to many security challenges facing AI/ML engineers, and critically, their mitigations. The book covers not only adversarial machine learning attacks, but also non-ML driven vulnerabilities, and gives stakeholders solid advice on how to address these. I particularly appreciated advice on how to minimize threat surfaces and “avoid helping hackers,” critical information for an industry where security can sometimes be a lower priority than rapid prototyping and innovation. I would love to see future editions give even more emphasis to putting security into production, as in my experience this is something many organizations struggle with. Overall this book is a huge step forward for ML security awareness, and a must-read for anyone working on AI/ML systems in production.
Amazon Verified reviewAmazon
Juan JoseApr 08, 2023
Full star iconFull star iconFull star iconFull star iconFull star icon5
As a cybersecurity professional turned AI engineer, I have been searching for resources that combine both fields, and "Machine Learning for Security: Principles, Applications, and Techniques" has not disappointed me. This book is an excellent compendium of essential knowledge, and the authors have made it engaging and accessible to readers with varying levels of expertise.The book begins by laying a solid foundation of machine learning concepts and gradually moves to discuss their applications in the realm of cybersecurity. What truly sets this book apart is its use of real-world examples and case studies, making it easier to understand the practical aspects of implementing these techniques in diverse security scenarios. The hands-on exercises and code snippets provided throughout the book are invaluable for those looking to apply their newfound knowledge.As someone who is passionate about responsible AI, I appreciate the authors' dedication to addressing the ethical considerations of utilizing machine learning in security applications. The book thoughtfully discusses potential biases and pitfalls that may arise in these systems and offers guidance on designing transparent and ethical algorithms. This attention to detail sets the book apart from others in the field.In conclusion, "Machine Learning for Security: Principles, Applications, and Techniques" is an indispensable resource for anyone interested in the confluence of machine learning and cybersecurity. Whether you are a seasoned professional or a newcomer, this book will serve as a trusted guide, helping you navigate and excel in this rapidly evolving domain.
Amazon Verified reviewAmazon
Luca MassaronFeb 28, 2023
Full star iconFull star iconFull star iconFull star iconFull star icon5
The elephant in the room is that we do talk a lot about machine learning technicalities, from model building to deploying, but the security and reliability of the solutions we create is seldom mentioned or considered anywhere. John's book, for which I have been one of the technical reviewers, is one of the few ones to illustrate and exemplify what security implies in machine learning.Using a clear language and many examples, the book approaches the topic by going from defining machine learning security to specific areas of interest such as risk mitigation in model development, adversarial machine learning attacks, anomalies, malware on systems and networks. It also touches topics related to security such as frauds, deep fakes, ethical behavior and fairness in machine learning.As a machine learning expert I found much information on the security world that I didn't know. I noticed and appreciated how the author takes great care in explaining core concepts and ideas from the basis, making it an ideal guide for everyone working in machine learning and AI and willing to approach security from its foundations. I recommend the book as a solid tool to acquire all the knowledge to rethink machine learning and AI also under the perspective of security.
Amazon Verified reviewAmazon
Nirmal BFeb 18, 2023
Full star iconFull star iconFull star iconFull star iconEmpty star icon4
I got an opportunity to be an early reviewer of this book. I must say that it is one of the rare collections that you will find about security in ML models. It is very common that people write and talk about building ML models, however it is always rare that people talk about securing the ML model itself. I work in security domain, and ML; and I have found that because data science and ML are mostly about using open source libraries and packages, sometimes the security or threat modeling of the ML system is overlooked or bypassed. However if your data or model is corrupted, then the model will misbehave or behave as instructed by the hackers.Author has done a great job in covering security principles from different stages of ML workflow- including training data to inference (model poisoning and evasion), along with anomalies and what to look for.The only reason I gave 4 instead of 5, is because the book has tried to cover little bit more information than actually needed from ML security standpoint. Some of the sections like Network related security and AI fairness, and ethical AI are good information, but I do also feel it overloads from different directions. However if you are looking for more info the better, this could be added value too.Overall it is a great book and must read if you are building ML models and want to do it in a secure way. Think about this- if you want to put your model in production, a working model is not the suffice answer, a working and secured model is the way to go :)
Amazon Verified reviewAmazon
  • Arrow left icon Previous
  • 1
  • 2
  • Arrow right icon Next

People who bought this also bought

Left arrow icon
Causal Inference and Discovery in Python
Causal Inference and Discovery in Python
Read more
May 2023466 pages
Full star icon4.5 (50)
eBook
eBook
$38.99$43.99
$53.99
Generative AI with LangChain
Generative AI with LangChain
Read more
Dec 2023376 pages
Full star icon4 (35)
eBook
eBook
$56.99$63.99
$79.99
Modern Generative AI with ChatGPT and OpenAI Models
Modern Generative AI with ChatGPT and OpenAI Models
Read more
May 2023286 pages
Full star icon4.2 (35)
eBook
eBook
$35.98$39.99
$49.99
Deep Learning with TensorFlow and Keras – 3rd edition
Deep Learning with TensorFlow and Keras – 3rd edition
Read more
Oct 2022698 pages
Full star icon4.6 (45)
eBook
eBook
$35.98$39.99
$49.99
Machine Learning Engineering  with Python
Machine Learning Engineering with Python
Read more
Aug 2023462 pages
Full star icon4.6 (38)
eBook
eBook
$35.98$39.99
$49.99
Right arrow icon

About the author

Profile icon John Paul Mueller
John Paul Mueller
Github icon
John Paul Mueller is a seasoned author and technical editor. He has writing in his blood, having produced 121 books and more than 600 articles to date. The topics range from networking to artificial intelligence and from database management to heads-down programming. Some of his current books include discussions of data science, machine learning, and algorithms. He also writes about computer languages such as C++, C#, and Python. His technical editing skills have helped more than 70 authors refine the content of their manuscripts. John has provided technical editing services to a variety of magazines, performed various kinds of consulting, and he writes certification exams.
Read more
See other products by John Paul Mueller
Getfree access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an audiobook?Chevron down iconChevron up icon

Where there is an audiobook version of a title available, you can buy it from the book details for that title. Your audiobook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalized audiobook download file.

Clicking the link will download the audiobook in a ZIP file. Unzip the ZIP file to your desired location to access the audiobook’s .mp3 files. You may play these .mp3 files on any supported player or device of your choice.

Please Note: Packt audiobooks are non-returnable and non-refundable.

Packt audiobook and Licensing: When you buy an audiobook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it, we have tried to balance the need for the audiobook to be usable for you the listener with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your audiobook for your own use onto any machine
  • You may not pass copies of the audiobook on to anyone else

How can I make a purchase on your website?Chevron down iconChevron up icon

If you want to purchase a video course, audiobook, eBook, or Bundle (Print+eBook) please follow the below steps:

  1. Register on our website using your email address and password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title.
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Card, or PayPal)

Where can I access support around an audiobook?Chevron down iconChevron up icon

  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, usewww.packtpub.com/contact-us

What are the benefits of audiobooks?Chevron down iconChevron up icon

  • You can get the information you need immediately
  • You can easily take them with you on a laptop or mobile device
  • You can download them an unlimited number of times
  • There is no password protection
  • They save resources and space
  • You can multitask while listening to audiobooks
  • What is an audiobook?Chevron down iconChevron up icon

    An audiobook, also known as a talking book, is a recorded version of a book where the content is read aloud.


    [8]ページ先頭

    ©2009-2025 Movatter.jp