Further reading
The following bullets provide you with some additional reading that you may find useful in further understanding the materials in this chapter:
- Consider how mobile devices represent a significant threat to your business: 5 Ways Your Mobile Device Can Get Malware (https://www.securitymetrics.com/blog/5-ways-your-mobile-device-can-get-malware)
- Read more about psychology and hacking: Psyber Security: Thwarting Hackers with Behavioral Science (https://www.psychologicalscience.org/observer/psyber-security-thwarting-hackers-with-behavioral-science)
- Understand overfitting and underfitting issues with kNN: K-Nearest Neighbors (https://www.codecademy.com/learn/introduction-to-supervised-learning-skill-path/modules/k-nearest-neighbors-skill-path/cheatsheet)
- Read about the effect of the curse of dimensionality when working with kNN: k-Nearest Neighbors and the Curse of Dimensionality (https://towardsdatascience.com/k-nearest-neighbors-and-the-curse-of-dimensionality...