Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Srinivasa Rao Aravill Privacy-Preser ving Machine Learnin (Paperback) (UK IMPORT)
Another great item from Rarewaves | Free delivery!
US $73.00
ApproximatelyS$ 93.69
Condition:
Brand New
A new, unread, unused book in perfect condition with no missing or damaged pages.
More than 10 available
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free Standard Shipping from outside US.
Located in: Rushden, United Kingdom
Delivery:
Estimated between Mon, 6 Oct and Thu, 16 Oct to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:116717370159
Item specifics
- Condition
- Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
- Book Title
- Privacy-Preserving Machine Learning
- Title
- Privacy-Preserving Machine Learning
- Subtitle
- A use-case-driven approach to building and protecting ML pipeline
- Contributor
- Sam Hamilton (Foreword by)
- ISBN-10
- 1800564678
- EAN
- 9781800564671
- ISBN
- 9781800564671
- Release Year
- 2024
- Release Date
- 05/24/2024
- Genre
- Computing & Internet
- Country/Region of Manufacture
- GB
- Item Height
- 235mm
About this product
Product Identifiers
Publisher
Packt Publishing, The Limited
ISBN-10
1800564678
ISBN-13
9781800564671
eBay Product ID (ePID)
15068278916
Product Key Features
Number of Pages
332 Pages
Language
English
Publication Name
Privacy-Preserving Machine Learning : Use Cases Driven Approach to Develop and Protect Machine Learning Pipelines from Privacy and Security Threats
Publication Year
2024
Subject
Security / Online Safety & Privacy, General
Type
Textbook
Subject Area
Computers, Science
Format
Trade Paperback
Dimensions
Item Length
92.5 in
Item Width
75 in
Additional Product Features
Intended Audience
Trade
Dewey Edition
23
Dewey Decimal
006.31
Synopsis
Gain hands-on experience in data privacy and privacy-preserving machine learning with open-source ML frameworks, while exploring techniques and algorithms to protect sensitive data from privacy breaches Key Features Understand machine learning privacy risks and employ machine learning algorithms to safeguard data against breaches Develop and deploy privacy-preserving ML pipelines using open-source frameworks Gain insights into confidential computing and its role in countering memory-based data attacks Purchase of the print or Kindle book includes a free PDF eBook Book Description Privacy regulations are evolving each year and compliance with privacy regulations is mandatory for every enterprise. Machine learning engineers are required to not only analyze large amounts of data to gain crucial insights, but also comply with privacy regulations to protect sensitive data. This may seem quite challenging considering the large volume of data involved and lack of in-depth expertise in privacy-preserving machine learning.This book delves into data privacy, machine learning privacy threats, and real-world cases of privacy-preserving machine learning, as well as open-source frameworks for implementation. You'll be guided through developing anti-money laundering solutions via federated learning and differential privacy. Dedicated sections also address data in-memory attacks and strategies for safeguarding data and ML models. The book concludes by discussing the necessity of confidential computation, privacy-preserving machine learning benchmarks, and cutting-edge research.By the end of this machine learning book, you'll be well-versed in privacy-preserving machine learning and know how to effectively protect data from threats and attacks in the real world. What you will learn Study data privacy, threats, and attacks across different machine learning phases Explore Uber and Apple cases for applying differential privacy and enhancing data security Discover IID and non-IID data sets as well as data categories Use open-source tools for federated learning (FL) and explore FL algorithms and benchmarks Understand secure multiparty computation with PSI for large data Get up to speed with confidential computation and find out how it helps data in memory attacks Who this book is for This book is for data scientists, machine learning engineers, and privacy engineers who have working knowledge of mathematics as well as basic knowledge in any one of the ML frameworks (TensorFlow, PyTorch, or scikit-learn). ]]>, Gain hands-on experience in data privacy and privacy-preserving machine learning with open-source ML frameworks, while exploring techniques and algorithms to protect sensitive data from privacy breaches Key Features Understand machine learning privacy risks and employ machine learning algorithms to safeguard data against breaches Develop and deploy privacy-preserving ML pipelines using open-source frameworks Gain insights into confidential computing and its role in countering memory-based data attacks Purchase of the print or Kindle book includes a free PDF eBook Book Description Privacy regulations are evolving each year and compliance with privacy regulations is mandatory for every enterprise. Machine learning engineers are required to not only analyze large amounts of data to gain crucial insights, but also comply with privacy regulations to protect sensitive data. This may seem quite challenging considering the large volume of data involved and lack of in-depth expertise in privacy-preserving machine learning. This book delves into data privacy, machine learning privacy threats, and real-world cases of privacy-preserving machine learning, as well as open-source frameworks for implementation. You'll be guided through developing anti-money laundering solutions via federated learning and differential privacy. Dedicated sections also address data in-memory attacks and strategies for safeguarding data and ML models. The book concludes by discussing the necessity of confidential computation, privacy-preserving machine learning benchmarks, and cutting-edge research. By the end of this machine learning book, you'll be well-versed in privacy-preserving machine learning and know how to effectively protect data from threats and attacks in the real world. What you will learn Study data privacy, threats, and attacks across different machine learning phases Explore Uber and Apple cases for applying differential privacy and enhancing data security Discover IID and non-IID data sets as well as data categories Use open-source tools for federated learning (FL) and explore FL algorithms and benchmarks Understand secure multiparty computation with PSI for large data Get up to speed with confidential computation and find out how it helps data in memory attacks Who this book is for This book is for data scientists, machine learning engineers, and privacy engineers who have working knowledge of mathematics as well as basic knowledge in any one of the ML frameworks (TensorFlow, PyTorch, or scikit-learn). Table of Contents Introduction to Data Privacy, Privacy threats and breaches Machine Learning Phases and privacy threats/attacks in each phase Overview of Privacy Preserving Data Analysis and Introduction to Differential Privacy Differential Privacy Algorithms, Pros and Cons Developing Applications with Different Privacy using open source frameworks Need for Federated Learning and implementing Federated Learning using open source frameworks Federated Learning benchmarks, startups and next opportunity Homomorphic Encryption and Secure Multiparty Computation Confidential computing - what, why and current state Privacy Preserving in Large Language Models
LC Classification Number
Q325.5
Item description from the seller
Seller business information
VAT number: GB 864154811
Seller feedback (788,989)
- u***e (21596)- Feedback left by buyer.Past monthVerified purchaseTy
- a***9 (2702)- Feedback left by buyer.Past monthVerified purchaseA+
- 0***d (172)- Feedback left by buyer.Past monthVerified purchasetks for a great item loved putting it together.