소장자료

>>
소장자료
>
000 nam5i
001 2210080933976
003 DE-He213
005 20250321105310
007 cr nn 008mamaa
008 240405s2024 sz | s |||| 0|eng d
020 a97830315425279978-3-031-54252-7
024 a10.1007/978-3-031-54252-72doi
040 a221008
050 aHF54.5-54.56
072 aKJQ2bicssc
072 aUF2bicssc
072 aBUS0830002bisacsh
072 aKJQ2thema
072 aUF2thema
082 a658.05223
245 00 aGenerative AI Securityh[electronic resource] :bTheories and Practices /cedited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli.
250 a1st ed. 2024.
264 aCham :bSpringer Nature Switzerland :bImprint: Springer,c2024.
300 aXXXV, 338 p. 44 illus., 34 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aFuture of Business and Finance,x2662-2475
505 aFoundations of Generative AI -- Navigating the GenAI Security -- AI Regulations -- Build Your Security Program for GenAI -- GenAI Data Security -- GenAI Model Security -- GenAI Application Level Security -- From LLMOps to DevSecOps for GenAI -- Utilizing Prompt Engineering to Operationalize Cyber Security -- Use GenAI Tools to Boost Your Security Posture.
520 aThis book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program. The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity.
650 aBusiness information services.
650 aFinancial risk management.
650 aData protection.
650 aArtificial intelligence.
650 aInformation technologyxMoral and ethical aspects.
650 aIT in Business.
650 aRisk Management.
650 aData and Information Security.
650 aArtificial Intelligence.
650 aInformation Ethics.
700 aHuang, Ken.eeditor.0(orcid)0009-0004-6502-36731https://orcid.org/0009-0004-6502-36734edt4http://id.loc.gov/vocabulary/relators/edt
700 aWang, Yang.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aGoertzel, Ben.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aLi, Yale.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aWright, Sean.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aPonnapalli, Jyoti.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9783031542510
776 iPrinted edition:z9783031542534
776 iPrinted edition:z9783031542541
830 aFuture of Business and Finance,x2662-2475
856 uhttps://doi.org/10.1007/978-3-031-54252-7
912 aZDB-2-BUM
912 aZDB-2-SXBM
950 aBusiness and Management (SpringerNature-41169)
950 aBusiness and Management (R0) (SpringerNature-43719)
Generative AI Security[electronic resource] :Theories and Practices /edited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli
종류
전자책
서명
Generative AI Security[electronic resource] :Theories and Practices /edited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli
저자명
판 사항
1st ed. 2024.
형태사항
XXXV, 338 p 44 illus, 34 illus in color online resource.
주기사항
This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program. The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기