Security Automation

This module explores security automation, focusing on the use of technology to perform security tasks automatically, reducing the need for human intervention. It covers the implementation of automated tools for threat detection, incident response, and compliance monitoring, as well as the integration of AI and machine learning to enhance these processes.

Portal > Artificial Intelligence > Security Automation

Curriculum Builder

Jain, Anil, Ross, Arun A., and Karthik Nandakumar “Introduction to Biometrics,” Springer (Switzerland), 2011 ISBN: 978-1-4899-8543-9

Zhang, David, Lu, Guangming, and Lei Zhang “Advanced Biometrics,” Springer (Switzerland), 2017 ISBN: 978-3-319-87107-3

Brownlee, Jason. “Clever Algorithms: Nature-Inspired Programming Recipes,” Self-published (Lulu), 2012 ISBN: 978-1-4467-8506-5

Gendreau, Michel, and Jean-Yves Potvin. “Handbook of Metaheuristics,” Second Edition Springer, 2010. ISBN: 978-1-4419-1663-1

Witten, Ian H, Frank, Eibe, and Mark A. Hall. “Data Mining. Practical machine learning tools and techniques.” 3ª Ed. Morgan Kaufmann, 2011. ISBN 978-0-12-374856-0

Han, Jiawei, Kamber, Micheline, and Jian Pei. “Data Mining: Concepts and Techniques.” 3ª Ed. Morgan Kaufmann, 2012. ISBN 978-0-12-381479-1

Solanas, Agusti, and Antoni Martínez-Ballesté. Advances in Artificial Intelligence for Privacy Protection and Security. 1st ed. Vol. 1. Singapore: World Scientific Publishing Co. Pte. Ltd, 2009. doi:10.1142/6707#t=toc.

Kelleher, J. Mac Namee, B., and A. D’Arcy. “Fundamentals of machine learning for predictive data analytics: Algorithms, worked examples, and case studies.” (2nd ed.). MIT Press. pp. 856. ISBN: 9780262044691

Murphy, Kevin. “Machine Learning: A Probabilistic Perspective,” MIT Press, 2012. ISBN: 9780262018029.