Skip to content
You are not logged in |Login  

LEADER 00000nam a2200781   4500 
001    BEP9781951527273 
003    BEP 
005    20190417111955.0 
006    m    eo  d         
007    cr cn |||m|||a 
008    190417s2020    nyua   fob    001 0 eng d 
020    9781951527273|qe-book 
020    |z9781951527266|qprint 
035    (OCoLC)1144893165 
035    (CaBNVSL)slc00000349 
040    CaBNVSL|beng|erda|cCaBNVSL|dCaBNVSL 
049    RIDW 
050  4 Q335|b.A33 2020eb 
082 04 006.3|223 
090    Q335|b.A33 2020eb 
100 1  Addo, Archie,|eauthor. 
245 10 Artificial intelligence for security /|cArchie Addo, Srini
       Centhala, and Muthu Shanmugam. 
250    First edition. 
264  1 New York, New York (222 East 46th Street, New York, NY 
       10017) :|bBusiness Expert Press,|c2020. 
300    1 online resource (vi, 139 pages) :|billustrations (some 
       color). 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc 
347    text file|2rdaft 
490 1  Business law and corporate risk management collection,
       |x2333-6730 
504    Includes bibliographical references (pages 129-132) and 
       index. 
505 0  Chapter 1. Introduction -- Chapter 2. Introduction to 
       security -- Chapter 3. How AI and security come together? 
       -- Chapter 4. Knowledgebase -- Chapter 5. AI solutions for
       security -- Chapter 6. Industry domain -- Chapter 7. 
       Conclusion. 
506    Access restricted to authorized users and institutions. 
520 3  Artificial Intelligence (AI) for security management 
       explores terminologies of security and how AI can be 
       applied to automate security processes. Additionally, the 
       text provides detailed explanations and recommendations 
       for how implement procedures. Practical examples and real-
       time use cases are evaluated and suggest appropriate 
       algorithms based on the author's experiences. Threat and 
       associated securities from the data, process, people, 
       things (e.g., Internet of things), systems, and actions 
       were used to develop security knowledge base, which will 
       help readers to build their own knowledge base. This book 
       will help the readers to start their AI journey on 
       security and how data can be applied to drive business 
       actions to build secure environment. 
530    Also available in print. 
538    Mode of access: World Wide Web. 
538    System requirements: Adobe Acrobat reader. 
561    Purchased with the Phippen Library Fund. 
588    Description based on PDF viewed 03/14/2020. 
650  0 Artificial intelligence.|0https://id.loc.gov/authorities/
       subjects/sh85008180 
650  0 Management information systems.|0https://id.loc.gov/
       authorities/subjects/sh85080359 
650  0 Business intelligence.|0https://id.loc.gov/authorities/
       subjects/sh85018300 
650  7 Artificial intelligence.|2fast|0https://id.worldcat.org/
       fast/817247 
650  7 Management information systems.|2fast|0https://
       id.worldcat.org/fast/1007271 
650  7 Business intelligence.|2fast|0https://id.worldcat.org/fast
       /842723 
653    Project management. 
653    Construction management. 
653    Program management. 
653    Skills development. 
653    Security. 
653    Artificial intelligence. 
653    Analytics. 
653    ML. 
653    Mitigation. 
653    Performance review. 
653    Data science, and business intelligence. 
655  0 Electronic books. 
700 1  Centhala, Srini,|eauthor. 
700 1  Shanmugam, Muthu,|eauthor. 
776 08 |iPrint version:|z9781951527266 
830  0 Business law and corporate risk management collection,.
       |x2333-6730 
856 40 |uhttps://rider.idm.oclc.org/login?url=https://
       portal.igpublish.com/iglibrary/search/BEPB0000965.html
       |zOnline ebook via BEP. Access restricted to current Rider
       University students, faculty, and staff. 
901    MARCIVE 20231220 
948    |d20220401|tBEP reload 277|lridw 
948    |d20210525|cBEP|tBEP2021initial 229|lridw