TY - BOOK AU - Gupta, Pramod [Editor] AU - Sehgal, Naresh Kumar [Editor] AU - Acken, John M. [Editor] TI - Introduction to machine learning with security: theory and practice using python in the cloud T2 - Synthesis Lectures on Engineering, Science, and Technology (SLEST) SN - 9783031591716 U1 - 006.31 PY - 2025/// CY - Cham PB - Springer KW - Machine learning KW - Cloud computing N1 - Table of contents: Front Matter Pages i-xxviii Download chapter PDF Theory Front Matter Pages 1-1 Download chapter PDF Machine Learning Concepts Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 3-44 Machine Learning Algorithms Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 45-176 Deep Learning and Cloud Computing Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 177-199 Cloud Computing Concepts Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 201-214 Information Security and Cloud Computing Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 215-228 Trust and Security in a Cloud Environment Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 229-246 Hardware Based AI and ML Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 247-270 Hardware Based Security Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 271-277 Practices Front Matter Pages 279-279 Download chapter PDF Practical Aspects in Machine Learning Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 281-330 Analytics in the Cloud Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 331-350 Healthcare in the Cloud: A Few Case Studies Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 351-370 Evolution and Risks of LLMs Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 371-379 Machine Learning Operations Pramod Gupta, Naresh Kumar Sehgal, John M. Acken Pages 381-413 [https://link.springer.com/book/10.1007/978-3-031-59170-9] N2 - This book provides an introduction to machine learning, security and cloud computing, from a conceptual level, along with their usage with underlying infrastructure. The authors emphasize fundamentals and best practices for using AI and ML in a dynamic infrastructure with cloud computing and high security, preparing readers to select and make use of appropriate techniques. Important topics are demonstrated using real applications and case studies. (https://link.springer.com/book/10.1007/978-3-031-59170-9) ER -