Part 2 – Creating a Secure System Using ML
This part challenges the assumption that only data scientists work with ML applications by reviewing the topic of ML security from a number of perspectives, especially from that of researchers.
This section includes the following chapters:
- Chapter 4, Considering the Threat Environment
 - Chapter 5, Keeping Your Network Clean
 - Chapter 6, Detecting and Analyzing Anomalies
 - Chapter 7, Dealing with Malware
 - Chapter 8, Locating Potential Fraud
 - Chapter 9, Defending against Hackers