Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The AI Product Manager's Handbook

You're reading from   The AI Product Manager's Handbook Develop a product that takes advantage of machine learning to solve AI problems

Arrow left icon
Product type Paperback
Published in Feb 2023
Publisher Packt
ISBN-13 9781804612934
Length 250 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Irene Bratsis Irene Bratsis
Author Profile Icon Irene Bratsis
Irene Bratsis
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Part 1 – Lay of the Land – Terms, Infrastructure, Types of AI, and Products Done Well
2. Chapter 1: Understanding the Infrastructure and Tools for Building AI Products FREE CHAPTER 3. Chapter 2: Model Development and Maintenance for AI Products 4. Chapter 3: Machine Learning and Deep Learning Deep Dive 5. Chapter 4: Commercializing AI Products 6. Chapter 5: AI Transformation and Its Impact on Product Management 7. Part 2 – Building an AI-Native Product
8. Chapter 6: Understanding the AI-Native Product 9. Chapter 7: Productizing the ML Service 10. Chapter 8: Customization for Verticals, Customers, and Peer Groups 11. Chapter 9: Macro and Micro AI for Your Product 12. Chapter 10: Benchmarking Performance, Growth Hacking, and Cost 13. Part 3 – Integrating AI into Existing Non-AI Products
14. Chapter 11: The Rising Tide of AI 15. Chapter 12: Trends and Insights across Industry 16. Chapter 13: Evolving Products into AI Products 17. Index 18. Other Books You May Enjoy

Anomaly detection and user and entity behavior analytics

Uncovering patterns and changes in those patterns is at the very heart of anomaly detection. In cybersecurity, this established baseline and deviation from it are what create the use case of anomaly detection. Once there’s been an anomaly and an action is required from the system, we can then move toward rectifying it somehow. Often, cyber attacks come from within networks and have clever ways of hiding their tracks, but with advanced pattern recognition that’s used for anomaly detection, AI systems can see when some actor/user is behaving in ways that don’t make sense for a normal user.

As we went through some of the use cases for various verticals, you’re likely seeing patterns of your own emerge in terms of some of the underlying tech used to power those applications of AI. One of these overarching use cases is encapsulated in UEBA, which is, in many ways, an undercurrent for many of the use...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime