Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Machine Learning Security Principles
Machine Learning Security Principles

Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes

eBook
$25.99 $37.99
Paperback
$46.99
Audiobook
$44.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files (MP3) and a supplementary PDF
Product feature icon Access this title in our online player
Product feature icon DRM FREE - Listen whenever, wherever and however you want

Key benefits

  • Discover how hackers rely on misdirection and deep fakes to fool even the best security systems
  • Retain the usefulness of your data by detecting unwanted and invalid modifications
  • Develop application code to meet the security requirements related to machine learning

Description

Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning. As you progress to the second part, you’ll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references. The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary’s reputation. Once you’ve understood hacker goals and detection techniques, you’ll learn about the ramifications of deep fakes, followed by mitigation strategies. This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You’ll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks. By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.

Who is this book for?

Whether you’re a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have. While most resources available on this topic are written in a language more suitable for experts, this guide presents security in an easy-to-understand way, employing a host of diagrams to explain concepts to visual learners. While familiarity with machine learning concepts is assumed, knowledge of Python and programming in general will be useful.

What you will learn

  • Explore methods to detect and prevent illegal access to your system
  • Implement detection techniques when access does occur
  • Employ machine learning techniques to determine motivations
  • Mitigate hacker access once security is breached
  • Perform statistical measurement and behavior analysis
  • Repair damage to your data and applications
  • Use ethical data collection methods to reduce security risks

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Dec 30, 2022
Length: 8hrs 53mins
Edition : 1st
Language : English
ISBN-13 : 9781805124788
Vendor :
Google
Category :
Languages :

What do you get with Audiobook?

Product feature icon Download a zip folder containing audio files (MP3) and a supplementary PDF
Product feature icon Access this title in our online player
Product feature icon DRM FREE - Listen whenever, wherever and however you want

Product Details

Publication date : Dec 30, 2022
Length: 8hrs 53mins
Edition : 1st
Language : English
ISBN-13 : 9781805124788
Vendor :
Google
Category :
Languages :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 135.97
Machine Learning Model Serving Patterns and Best Practices
$41.99
Machine Learning Security Principles
$46.99
Machine Learning Techniques for Text
$46.99
Total $ 135.97 Stars icon

Table of Contents

18 Chapters
Part 1 – Securing a Machine Learning System Chevron down icon Chevron up icon
Chapter 1: Defining Machine Learning Security Chevron down icon Chevron up icon
Chapter 2: Mitigating Risk at Training by Validating and Maintaining Datasets Chevron down icon Chevron up icon
Chapter 3: Mitigating Inference Risk by Avoiding Adversarial Machine Learning Attacks Chevron down icon Chevron up icon
Part 2 – Creating a Secure System Using ML Chevron down icon Chevron up icon
Chapter 4: Considering the Threat Environment Chevron down icon Chevron up icon
Chapter 5: Keeping Your Network Clean Chevron down icon Chevron up icon
Chapter 6: Detecting and Analyzing Anomalies Chevron down icon Chevron up icon
Chapter 7: Dealing with Malware Chevron down icon Chevron up icon
Chapter 8: Locating Potential Fraud Chevron down icon Chevron up icon
Chapter 9: Defending against Hackers Chevron down icon Chevron up icon
Part 3 – Protecting against ML-Driven Attacks Chevron down icon Chevron up icon
Chapter 10: Considering the Ramifications of Deepfakes Chevron down icon Chevron up icon
Chapter 11: Leveraging Machine Learning for Hacking Chevron down icon Chevron up icon
Part 4 – Performing ML Tasks in an Ethical Manner Chevron down icon Chevron up icon
Chapter 12: Embracing and Incorporating Ethical Behavior Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Most Recent
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.4
(8 Ratings)
5 star 50%
4 star 37.5%
3 star 12.5%
2 star 0%
1 star 0%
Filter icon Filter
Most Recent

Filter reviews by




Moustafa Saleh Jan 18, 2024
Full star icon Full star icon Full star icon Empty star icon Empty star icon 3
The book is basic in general, not for advanced readers who want to know and implement solutions for securing AI or using AI for cybersecurity. The chapter that I really liked was chapter 3. Other than that, it's all basic information.
Amazon Verified review Amazon
Shanthababu Pandian Apr 30, 2023
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
In this digital data world, we have to keep our data, networks, user details, and application scope highly secure from prying eyes, of course! Especially concerning the DATA which faces PII and GDPR compliance, we have to take additional responsibilities and secure them, but we’re running our business in a very busy schedule building innovative data products and AIML solutions, pushing the data security aspects in the back and this is not correct.In this book, the author has provided curable prescriptions to manage machine learning projects with major dosages of medications to secure a machine learning system by guiding how to create a secure system using ML, protecting against ML-Driven Attacks, and Performing ML tasks in an ethical manner.The overall content was articulated well and lined up every chapter accurately to focus on the security principles strictly.In Part 1 - The author has started his journey in this book by discussing various ML algorithms, Identifying the ML security domains, and how to add security to ML systems. As we know ML depends heavily on clean data and the dataset is the foundation for ML stages and its implementation so, the author has considered first dataset security, defining threats and mitigating dataset modifications, and corruption aspects.The author has provided the most common attack techniques like Black Swan Theory, Evasion attacks, Model poisoning, Membership inference, and Trojan and backdoor attacks with extensive and exclusive details.In Part 2 – He helped us to create a secure system using ML, where he geared up with how to consider the threat environment in terms of business threats, and social threats. His special advice on how to keep our network clean with classical examples by creating real-time defenses and using supervised learning examples and developing predictive defenses is a classic piece of work.“Detecting and Analysing Anomalies” is a major topic for every Machine Learning engineer and a must-read topic. And of course, in Dealing with Malware - Defining malware and how to generate malware detection features and classifying them are special packs and certainly we can certainly use them in every ML project.If security comes into the picture, we must certainly discuss “Fraud Detecting”, especially in the ML domain. The author has given a clear path for readers to understand the types of fraud, and how to identify the fraud sources, and demonstrated the fraud detection application as an example.In Parts 3 & 4 – the author takes us to a detailed study of “Protecting against ML-Driven Attacks” with experience security issues that rely on traditional methods that are modified to meet the demands of the ML environment with Deepfakes and Leveraging Machine Learning for Hacking are astonishing topics and rare topics in any other ML books.Performing ML Tasks in an Ethical Manner is a mandatory part of all ML projects, and every ML Engineer must be aware of this because all the developers must now ensure that data is collected ethically, cleaned properly, and used correctly in a transparent manner and make sure ML inherently more secure.Overall, the author has provided the complete path to implementing the secured ML system for ML engineers. I can give 4.0/5.0 for this. Certainly, a special effort from the author is much appreciated.- Shanthababu PandianArtificial Intelligence and Analytics | Cloud Data and ML Architect | Scrum MasterNational and International Speaker | Blogger
Amazon Verified review Amazon
Juan Jose Apr 08, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As a cybersecurity professional turned AI engineer, I have been searching for resources that combine both fields, and "Machine Learning for Security: Principles, Applications, and Techniques" has not disappointed me. This book is an excellent compendium of essential knowledge, and the authors have made it engaging and accessible to readers with varying levels of expertise.The book begins by laying a solid foundation of machine learning concepts and gradually moves to discuss their applications in the realm of cybersecurity. What truly sets this book apart is its use of real-world examples and case studies, making it easier to understand the practical aspects of implementing these techniques in diverse security scenarios. The hands-on exercises and code snippets provided throughout the book are invaluable for those looking to apply their newfound knowledge.As someone who is passionate about responsible AI, I appreciate the authors' dedication to addressing the ethical considerations of utilizing machine learning in security applications. The book thoughtfully discusses potential biases and pitfalls that may arise in these systems and offers guidance on designing transparent and ethical algorithms. This attention to detail sets the book apart from others in the field.In conclusion, "Machine Learning for Security: Principles, Applications, and Techniques" is an indispensable resource for anyone interested in the confluence of machine learning and cybersecurity. Whether you are a seasoned professional or a newcomer, this book will serve as a trusted guide, helping you navigate and excel in this rapidly evolving domain.
Amazon Verified review Amazon
Disesdi Susanna Cox Mar 16, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As an industry practitioner working in the machine learning security space, I found this to be a fantastic introduction to many security challenges facing AI/ML engineers, and critically, their mitigations. The book covers not only adversarial machine learning attacks, but also non-ML driven vulnerabilities, and gives stakeholders solid advice on how to address these. I particularly appreciated advice on how to minimize threat surfaces and “avoid helping hackers,” critical information for an industry where security can sometimes be a lower priority than rapid prototyping and innovation. I would love to see future editions give even more emphasis to putting security into production, as in my experience this is something many organizations struggle with. Overall this book is a huge step forward for ML security awareness, and a must-read for anyone working on AI/ML systems in production.
Amazon Verified review Amazon
Adaobi Mar 12, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Machine Learning Security Principles is so much more than a book about security. It is a training manual on how to be responsible with data in a world where everyone is incorporating ML into every aspect of their business without truly understanding what ML is or how to use it effectively.ML has made mundane tasks so much more efficient and easier to process, but has in many ways has left organizations and the data they have vulnerable to hackers. John Mueller's expertise in AI, security, and programming makes him a great go-to source for understanding what ML is, learning how to secure your organization's data and make your network less vulnerable to attacks, and figuring out whether you are dealing with fraud. He even seals it all by showing you how to be ethically responsible when building your ML applications so that you're not holding on to such extremely sensitive data in the first place.This book is and informative and important read for anyone working with ML systems and emphasizes the importance of safeguarding those systems.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an audiobook? Chevron down icon Chevron up icon

Where there is an audiobook version of a title available, you can buy it from the book details for that title. Your audiobook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalized audiobook download file.

Clicking the link will download the audiobook in a ZIP file. Unzip the ZIP file to your desired location to access the audiobook’s .mp3 files. You may play these .mp3 files on any supported player or device of your choice.

Please Note: Packt audiobooks are non-returnable and non-refundable.

Packt audiobook and Licensing: When you buy an audiobook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it, we have tried to balance the need for the audiobook to be usable for you the listener with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your audiobook for your own use onto any machine
  • You may not pass copies of the audiobook on to anyone else

How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, audiobook, eBook, or Bundle (Print+eBook) please follow the below steps:

  1. Register on our website using your email address and password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title.
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Card, or PayPal)

Where can I access support around an audiobook? Chevron down icon Chevron up icon

  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us

What are the benefits of audiobooks? Chevron down icon Chevron up icon

  • You can get the information you need immediately
  • You can easily take them with you on a laptop or mobile device
  • You can download them an unlimited number of times
  • There is no password protection
  • They save resources and space
  • You can multitask while listening to audiobooks
  • What is an audiobook? Chevron down icon Chevron up icon

    An audiobook, also known as a talking book, is a recorded version of a book where the content is read aloud.