官术网_书友最值得收藏!

Summary

Now we have learned the most commonly used machine learning techniques; before ping into practical labs, we need to acquire a fair understanding of how these models actually work. Our practical experience will start from the next chapter.

After reading this chapter, I assume that we can build our own development environment. The second chapter will show us what it takes to defend against advanced, computer-based, social engineering attacks, and we will learn how to build a smart phishing detector. Like in every chapter, we will start by learning the techniques behind the attacks, and we will walk through the practical steps in order to build a phishing detecting system.

主站蜘蛛池模板: 华容县| 博客| 西峡县| 大埔区| 通江县| 东乡县| 来安县| 瑞安市| 密山市| 垫江县| 神农架林区| 突泉县| 新乡市| 乐亭县| 宝丰县| 石林| 永兴县| 甘谷县| 辽源市| 赤壁市| 遵义县| 广宗县| 中牟县| 新邵县| 怀柔区| 宁安市| 乐安县| 墨竹工卡县| 杭锦旗| 佛教| 托克逊县| 三河市| 日喀则市| 从江县| 乐至县| 罗定市| 平湖市| 清苑县| 凤山县| 容城县| 新野县|