官术网_书友最值得收藏!

Summary

Now we have learned the most commonly used machine learning techniques; before ping into practical labs, we need to acquire a fair understanding of how these models actually work. Our practical experience will start from the next chapter.

After reading this chapter, I assume that we can build our own development environment. The second chapter will show us what it takes to defend against advanced, computer-based, social engineering attacks, and we will learn how to build a smart phishing detector. Like in every chapter, we will start by learning the techniques behind the attacks, and we will walk through the practical steps in order to build a phishing detecting system.

主站蜘蛛池模板: 资阳市| 象山县| 内丘县| 昌乐县| 嘉善县| 海伦市| 仪征市| 友谊县| 克山县| 长阳| 康定县| 株洲市| 杭州市| 维西| 康马县| 新津县| 周宁县| 游戏| 华阴市| 安丘市| 汉阴县| 宁化县| 新河县| 沂南县| 和田市| 河北省| 内黄县| 北京市| 东辽县| 蓬安县| 宣武区| 无锡市| 湘阴县| 仁化县| 通山县| 紫金县| 苍山县| 沾化县| 慈利县| 个旧市| 始兴县|