官术网_书友最值得收藏!

Summary

Now we have learned the most commonly used machine learning techniques; before ping into practical labs, we need to acquire a fair understanding of how these models actually work. Our practical experience will start from the next chapter.

After reading this chapter, I assume that we can build our own development environment. The second chapter will show us what it takes to defend against advanced, computer-based, social engineering attacks, and we will learn how to build a smart phishing detector. Like in every chapter, we will start by learning the techniques behind the attacks, and we will walk through the practical steps in order to build a phishing detecting system.

主站蜘蛛池模板: 马关县| 报价| 宁阳县| 如东县| 富平县| 县级市| 仙游县| 鸡泽县| 江达县| 平顶山市| 运城市| 安乡县| 石家庄市| 会理县| 西乌珠穆沁旗| 朝阳市| 天柱县| 成安县| 嫩江县| 唐山市| 吕梁市| 海林市| 木兰县| 绥芬河市| 如皋市| 安化县| 仙居县| 安庆市| 观塘区| 桃园县| 江门市| 黄梅县| 孝感市| 郸城县| 黔西| 兴海县| 康定县| 南康市| 都安| 朝阳区| 水富县|