Introduction to Artificial Intelligence for Security Professionals

NOW OUT: Introduction to Artificial Intelligence for Security Professionals

The Cylance Data Science Team has published an instructional book about artificial intelligence and machine learning that pulls together machine learning techniques and puts them into practical situations in order to teach readers how to thrive in a data driven world.

“In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today.” ~ The Cylance Data Science Team

OUT NOW: New Publication by the Cylance Data Science Team

Excerpt from foreword by Cylance President and CEO, Stuart McClure:

“My first exposure to applying a science to computers came at the University of Colorado, Boulder, where, from 1987-1991, I studied Psychology, Philosophy, and Computer Science Applications. As part of the Computer Science program, we studied Statistics and how to program a computer to do what we as humans wanted them to do.

I remember the pure euphoria of controlling the machine with programming languages, and I was in love.

In those computer science classes we were exposed to Alan Turing and the quintessential ‘Turing Test.’ The test is simple: Ask two ‘people’ (one being a computer) a set of written questions, and use the responses to them to make a determination. If the computer is indistinguishable from the human, then it has ‘passed’ the test. This concept intrigued me. Could a computer (Read more...)

This is a Security Bloggers Network syndicated blog post authored by Stuart McClure. Read the original post at: Cylance Blog