Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Machine Learning Security with Azure: Best practices for assessing, securing, and monitoring Azure Machine Learning workloads

Sprog
Engelsk
Format
Kategori

Fakta

With AI and machine learning (ML) models gaining popularity and integrating into more and more applications, it is more important than ever to ensure that models perform accurately and are not vulnerable to cyberattacks. However, attacks can target your data or environment as well. This book will help you identify security risks and apply the best practices to protect your assets on multiple levels, from data and models to applications and infrastructure.

This book begins by introducing what some common ML attacks are, how to identify your risks, and the industry standards and responsible AI principles you need to follow to gain an understanding of what you need to protect. Next, you will learn about the best practices to secure your assets. Starting with data protection and governance and then moving on to protect your infrastructure, you will gain insights into managing and securing your Azure ML workspace. This book introduces DevOps practices to automate your tasks securely and explains how to recover from ML attacks. Finally, you will learn how to set a security benchmark for your scenario and best practices to maintain and monitor your security posture.

By the end of this book, you’ll be able to implement best practices to assess and secure your ML assets throughout the Azure Machine Learning life cycle.

© 2023 Packt Publishing (E-bog): 9781805123958

Release date

E-bog: 28. december 2023

Andre kan også lide...

  1. Machinehood S.B. Divya
  2. HBR's 10 Must Reads 2024: The Definitive Management Ideas of the Year from Harvard Business Review (with bonus article "Democratizing Transformation" by Marco Iansiti and Satya Nadella) Harvard Business Review
  3. Hit Refresh: A Memoir by Microsoft’s CEO Satya Nadella
  4. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
  5. The Importance of Being Educable: A New Theory of Human Uniqueness Leslie Valiant
  6. Artificial Intelligence For Dummies Luca Massaron
  7. Cognitive Architectures: Exploring the Foundations, Theories, and Practical Applications of Human-Like Intelligence Systems in AI, Robotics, and Beyond May Sherry
  8. The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity Byron Reese
  9. Computational Thinking Peter J. Denning
  10. The Smart Home Manual: How to Automate Your Home to Keep Your Family Entertained, Comfortable, and Safe Marlon Buchanan
  11. The HESI A2 Health Education Systems, Inc. Admission Assessment Study Guide: Comprehensive Edition: Proven Methods for Successfully Passing the HESI A2 Exam With Confidence - Complete Practice Tests with Answers Joanna Johnson
  12. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  13. Summary of Iain Foulds's Learn Azure in a Month of Lunches IRB Media
  14. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
  15. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
  16. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  17. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  18. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  19. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
  20. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
  21. Linux for Beginners: How to Perform Linux Admin Tasks ATTILA KOVACS
  22. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  23. The NSA Report: Liberty and Security in a Changing World Richard A. Clarke
  24. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  25. Cybercrime Investigators Handbook Graeme Edwards
  26. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
  27. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  28. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
  29. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
  30. CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Andrew Hutz
  31. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  32. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
  33. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  34. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  35. Unstuck: Reframe your thinking to free yourself from the patterns and people that hold you back Lia Garvin
  36. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
  37. The CISO Evolution: Business Knowledge for Cybersecurity Executives Kyriakos Lambros
  38. Cybersecutity First Principles Rick Howard
  39. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
  40. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  41. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  42. Who Owns the Future? Jaron Lanier
  43. Cyber Hacking: Wars in Virtual Space Scientific American
  44. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  45. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
  46. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  47. Cybersecurity All-in-One For Dummies Joseph Steinberg

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Prøv gratis