Part 2 – Creating a Secure System Using ML
This part challenges the assumption that only data scientists work with ML applications by reviewing the topic of ML security from a number of perspectives, especially from that of researchers.
This section includes the following chapters:
- Chapter 4, Considering the Threat Environment
- Chapter 5, Keeping Your Network Clean
- Chapter 6, Detecting and Analyzing Anomalies
- Chapter 7, Dealing with Malware
- Chapter 8, Locating Potential Fraud
- Chapter 9, Defending against Hackers