reklama - zainteresowany?

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps - Helion

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps
ebook
Autor: John Sotiropoulos
Tytuł oryginału: Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps
ISBN: 9781835088678
stron: 586, Format: ebook
Data wydania: 2024-07-26
Księgarnia: Helion

Cena książki: 139,00 zł

Dodaj do koszyka Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips cybersecurity professionals with the skills to secure AI technologies, moving beyond research hype or business-as-usual strategies.
The strategy-based book is a comprehensive guide to AI security, presenting a structured approach with practical examples to identify and counter adversarial attacks. This book goes beyond a random selection of threats and consolidates recent research and industry standards, incorporating taxonomies from MITRE, NIST, and OWASP. Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. To gain deeper insights, you’ll cover examples of incorporating CI, MLOps, and security controls, including open-access LLMs and ML SBOMs. Based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI.
By the end of this book, you’ll be able to develop, deploy, and secure AI systems effectively.

Dodaj do koszyka Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

 

Osoby które kupowały "Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps", wybierały także:

  • Windows Media Center. Domowe centrum rozrywki
  • Ruby on Rails. Ćwiczenia
  • Przywództwo w Å›wiecie VUCA. Jak być skutecznym liderem w niepewnym Å›rodowisku
  • Scrum. O zwinnym zarzÄ…dzaniu projektami. Wydanie II rozszerzone
  • Od hierarchii do turkusu, czyli jak zarzÄ…dzać w XXI wieku

Dodaj do koszyka Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

Spis treści

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps eBook -- spis treści

  • 1. Getting Started with AI
  • 2. Building Our Adversarial Playground
  • 3. Security and Adversarial AI
  • 4. Poisoning Attacks
  • 5. Model Tampering with Trojan Horses and Model Reprogramming
  • 6. Supply Chain Attacks and Adversarial AI
  • 7. Evasion Attacks against Deployed AI
  • 8. Privacy Attacks – Stealing Models
  • 9. Privacy Attacks – Stealing Data
  • 10. Privacy-Preserving AI
  • 11. Generative AI – A New Frontier
  • 12. Weaponizing GANs for Deepfakes and Adversarial Attacks
  • 13. LLM Foundations for Adversarial AI
  • 14. Adversarial Attacks with Prompts
  • 15. Poisoning Attacks and LLMs
  • 16. Advanced Generative AI Scenarios
  • 17. Secure by Design and Trustworthy AI
  • 18. AI Security with MLSecOps
  • 19. Maturing AI Security

Dodaj do koszyka Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2025 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.