A Machine-Learning Approach to Phishing Detection and Defense

The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. This book also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.

Featured book: A Machine-Learning Approach to Phishing Detection and Defense

Cloud Native Java

Work takes time to flow through an organization and ultimately be deployed to production where it captures value. It’s critical to reduce time-to-production. Software is a competitive advantage for many organizations and industries. But velocity, for velocity’s sake, is dangerous. Microservices invite architectural complexity that few are prepared to address. In Cloud Native Java, we look at how high-performance organizations are addressing the requirements of distribution with Spring Cloud.

Featured video: Cloud Native Java

Concurrent Object-Oriented Programming

Register now for the next ACM Learning Webinar, "Concurrent Object-Oriented Programming," presented live by Bertrand Meyer, CTO of Eiffel Software, on November 15 at 12:00 PM ET. Leave your questions now or anytime before the live event on ACM's Discourse Page.

Image of Bertrand Meyer

Scala Introduction

Scala mixes programming paradigms, and so presents a challenge to programmers coming from any other language. This course demystifies some of the techniques associated with Scala programming. This course is ideal for programmers with some experience of programming in another language looking to get a start in Scala.

Featured course: Scala Introduction

Live Online Training: Blockchain Applications and Smart Contracts

Blockchain and crypto currency are important tools for a decentralized market that needs to protect its speed, security, and reputation. This training will cover the basics of blockchain, digital trust, major cryptocurrency solutions, and it will teach you how to define and code digital contracts. Students in this course will learn how to create and run successful applications on blockchain.

Featured resource: Live Online Training: Blockchain Applications and Smart Contracts

Explainable Machine Learning Models for Healthcare AI

View the most recent ACM Learning Webinar, "Explainable Machine Learning Models for Healthcare AI," on demand. This talk was presented by Ankur Teredesai, Dr. Carly Eckert, Muhammad Aurangzeb Ahmad, and Vikas Kumar of KenSci. Continue the discussion and checkout further resources on ACM's Discourse Page.

Image of Ankur Teredesai

Project Jupyter: From Computational Notebooks to Large Scale Data Science with Sensitive Data

View the ACM Learning Webinar, "Project Jupyter: From Computational Notebooks to Large Scale Data Science with Sensitive Data," on demand. This talk was presented by Brian Granger, Associate Professor of Physics and Data Science at Cal Poly State University. Continue the discussion and checkout further resources on ACM's Discourse Page.

Image of Brian Granger

Ian Goodfellow on Adversarial Machine Learning

View the ACM Learning Webinar, "Adversarial Machine Learning," on demand. This talk is presented by Ian Goodfellow, Staff Research Scientist at Google Brain. Negar Rostamzadeh, Research Scientist at Element AI, moderated the Q&A following the talk. Continue the discussion and checkout further resources on ACM's Discourse Page.

Image of Ian Goodfellow

ACM Distinguished Speakers Program

The Distinguished Speakers Program (DSP) is one of ACM's most valued outreach programs, providing universities, corporations, event and conference planners, and local ACM chapters with direct access to top technology leaders and innovators from nearly every sector of the computing industry. ACM will cover the cost of transportation for the speaker to travel to your event.