000 | 03032nam a2200553 i 4500 | ||
---|---|---|---|
001 | 9781951527273 | ||
003 | BEP | ||
005 | 20240726104617.0 | ||
008 | 190417s2020 nyua fob 001 0 eng d | ||
020 | _a9781951527273 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 0 | 4 |
_aQ335 _b.A785 2020 |
100 | 1 |
_aAddo, Archie, _e1 |
|
245 | 1 | 0 | _aArtificial intelligence for security /Archie Addo, Srini Centhala, and Muthu Shanmugam. |
250 | _aFirst edition. | ||
260 |
_aNew York, New York (222 East 46th Street, New York, NY 10017) : _bBusiness Expert Press, _c(c)2020. |
||
300 |
_a1 online resource (vi, 139 pages) : _billustrations (some color) |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
490 | 1 | _aBusiness law and corporate risk management collection, | |
504 | _a2 | ||
505 | 0 | 0 |
_aChapter 1. Introduction -- _tChapter 2. Introduction to security -- _tChapter 3. How AI and security come together? -- _tChapter 4. Knowledgebase -- _tChapter 5. AI solutions for security -- _tChapter 6. Industry domain -- _tChapter 7. Conclusion. |
520 | 3 | _aArtificial Intelligence (AI) for security management explores terminologies of security and how AI can be applied to automate security processes. Additionally, the text provides detailed explanations and recommendations for how implement procedures. Practical examples and real-time use cases are evaluated and suggest appropriate algorithms based on the author's experiences. Threat and associated securities from the data, process, people, things (e.g., Internet of things), systems, and actions were used to develop security knowledge base, which will help readers to build their own knowledge base. This book will help the readers to start their AI journey on security and how data can be applied to drive business actions to build secure environment. | |
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat reader. | ||
588 | _aDescription based on PDF viewed 03/14/2020. | ||
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aManagement information systems. | |
650 | 0 | _aBusiness intelligence. | |
653 | _aProject management. | ||
653 | _aConstruction management. | ||
653 | _aProgram management. | ||
653 | _aSkills development. | ||
653 | _aSecurity. | ||
653 | _aArtificial intelligence. | ||
653 | _aAnalytics. | ||
653 | _aML. | ||
653 | _aMitigation. | ||
653 | _aPerformance review. | ||
653 | _aData science, and business intelligence. | ||
655 | 0 | _aElectronic books. | |
700 | 1 |
_aCenthala, Srini, _e1 |
|
700 | 1 |
_aShanmugam, Muthu, _e1 |
|
856 | 4 | 1 |
_uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000965.html _zClick here to access this RESOURCE ONLINE | Login using your my.ciu username & password |
942 |
_c1 _eBEP _hQ335 _m(c)2020 _QOB |
||
942 |
_c1 _eBEP _hQ335 _m(c)2020 _QOB |
||
999 |
_c72731 _d72731 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |