Artificial intelligence for security / Archie Addo, Srini Centhala, and Muthu Shanmugam.
Material type: TextSeries: Business law and corporate risk management collectionPublisher: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, [(c)2020.]Edition: First editionDescription: 1 online resource (vi, 139 pages) : illustrations (some color)Content type:- text
- computer
- online resource
- 9781951527273
- Q335
- COPYRIGHT NOT covered - Click this link to request copyright permission: https://lib.ciu.edu/copyright-request-form
Item type | Current library | Collection | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | Q335 (Browse shelf(Opens below)) | Link to resource | Available | BEP9781951527273 | |||
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library | Non-fiction | Q335 (Browse shelf(Opens below)) | Link to resource | Available | 9781951527273 | ||
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | Q (Browse shelf(Opens below)) | Link to resource | Available | ||||
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | Q (Browse shelf(Opens below)) | Link to resource | Available |
Chapter 1. Introduction -- Chapter 2. Introduction to security -- Chapter 3. How AI and security come together? -- Chapter 4. Knowledgebase -- Chapter 5. AI solutions for security -- Chapter 6. Industry domain -- Chapter 7. Conclusion.
Access restricted to authorized users and institutions.
Artificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment.
COPYRIGHT NOT covered - Click this link to request copyright permission:
https://lib.ciu.edu/copyright-request-form
Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.
Description based on PDF viewed 03/14/2020.
There are no comments on this title.