Эротические рассказы

Deep Learning Approaches to Cloud Security. Группа авторовЧитать онлайн книгу.

Deep Learning Approaches to Cloud Security - Группа авторов


Скачать книгу
who are working in the field of blockchain, cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities. The book series provides a comprehensive look at the various facets of cloud security: infrastructure, network, services, compliance and users. It will provide real-world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective. The book series will serve as a platform for books dealing with security concerns of decentralized applications (DApps) and smart contracts that operate on an open blockchain. The book series will be a comprehensive and up-to-date reference on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

       Publishers at Scrivener

      Martin Scrivener ([email protected]) Phillip Carmical ([email protected])

      Deep Learning Approaches to Cloud Security

      Edited by

       Pramod Singh Rathore

       Vishal Dutt

       Rashmi Agrawal

       Satya Murthy Sasubilli

      and

       Srinivasa Rao Swarna

Logo: Wiley

      This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA

      © 2022 Scrivener Publishing LLC

      For more information about Scrivener publications please visit www.scrivenerpublishing.com.

      All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

       Wiley Global Headquarters

      111 River Street, Hoboken, NJ 07030, USA

      For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

       Limit of Liability/Disclaimer of Warranty

      While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchant-ability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.

       Library of Congress Cataloging-in-Publication Data

      ISBN 9781119760528

      Cover image: Stockvault.com

      Cover design by Russell Richardson

      Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines

      Printed in the USA

      10 9 8 7 6 5 4 3 2 1

      Foreword

      This is Dr. Abhishek Kumar, Assistant Professor in Chitkara University, Himachal Pradesh. I have been involved in the research for more than 8 years with the authors of this book. This book is about a solution to these more intuitive problems. This solution is to allow computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts.

      This book is about how Deep Learning is the fastest growing field in computer science. Deep Learning algorithms and techniques are found to be useful in different areas like Automatic Machine Translation, Automatic Handwriting Generation, Visual Recognition, Fraud Detection, Detecting Developmental Delay in Children. However, applying Deep Learning techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to visualization. This book provides state of the art approaches of Deep Learning in these areas. It includes areas of detection, prediction, as well as future framework development, building service systems and analytical aspects. In all these topics, approaches of Deep Learning such as artificial neural networks, fuzzy logic, genetic algorithm and hybrid mechanisms are used. This book is intended for dealing with modeling and performance prediction of the efficient cloud security systems thereby bringing newer dimension.

       Dr. Abhishek Kumar

       Assistant Professor

       Abhishek Kumar || Assistant Professor, PhD, Senior Member (IEEE)

       Chitkara University Research and Innovation Network (CURIN) Chitkara University, India

      Preface

      This book is organized into fifteen chapters. Chapter 1 discusses the prevailing Biometric modalities, classification, and their working. It goes on to discuss the various approaches used for Facial Biometric Identification such as feature selection, extraction, face marking, and the nearest neighbor approach.


Скачать книгу
Яндекс.Метрика