![Mastering Machine Learning for Penetration Testing](https://wfqqreader-1252317822.image.myqcloud.com/cover/757/36699757/b_36699757.jpg)
上QQ阅读APP看书,第一时间看更新
Summary
Now we have learned the most commonly used machine learning techniques; before ping into practical labs, we need to acquire a fair understanding of how these models actually work. Our practical experience will start from the next chapter.
After reading this chapter, I assume that we can build our own development environment. The second chapter will show us what it takes to defend against advanced, computer-based, social engineering attacks, and we will learn how to build a smart phishing detector. Like in every chapter, we will start by learning the techniques behind the attacks, and we will walk through the practical steps in order to build a phishing detecting system.