Software that matters.
Artificial Intelligence and Machine Learning
Are your ML models robust to withstand attacks with fake data? The above husky does not exist and was created via adversarial machine learning to trick image classification models.
Train and protect your organization
Research ahead of its time
HERO - Rescue Vicky!
In over 500 pages the book starts by guiding you through the phases of establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive red team operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.
Seattle, WA US