000
|
|
nam5i |
001
|
|
2210080933976 |
003
|
|
DE-He213 |
005
|
|
20250321105310 |
007
|
|
cr nn 008mamaa |
008
|
|
240405s2024 sz | s |||| 0|eng d |
020
|
|
▼a9783031542527▼9978-3-031-54252-7 |
024
|
|
▼a10.1007/978-3-031-54252-7▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aHF54.5-54.56 |
072
|
|
▼aKJQ▼2bicssc |
072
|
|
▼aUF▼2bicssc |
072
|
|
▼aBUS083000▼2bisacsh |
072
|
|
▼aKJQ▼2thema |
072
|
|
▼aUF▼2thema |
082
|
|
▼a658.05▼223 |
245
|
00 |
▼aGenerative AI Security▼h[electronic resource] :▼bTheories and Practices /▼cedited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli. |
250
|
|
▼a1st ed. 2024. |
264
|
|
▼aCham :▼bSpringer Nature Switzerland :▼bImprint: Springer,▼c2024. |
300
|
|
▼aXXXV, 338 p. 44 illus., 34 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aFuture of Business and Finance,▼x2662-2475 |
505
|
|
▼aFoundations of Generative AI -- Navigating the GenAI Security -- AI Regulations -- Build Your Security Program for GenAI -- GenAI Data Security -- GenAI Model Security -- GenAI Application Level Security -- From LLMOps to DevSecOps for GenAI -- Utilizing Prompt Engineering to Operationalize Cyber Security -- Use GenAI Tools to Boost Your Security Posture. |
520
|
|
▼aThis book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program. The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity. |
650
|
|
▼aBusiness information services. |
650
|
|
▼aFinancial risk management. |
650
|
|
▼aData protection. |
650
|
|
▼aArtificial intelligence. |
650
|
|
▼aInformation technology▼xMoral and ethical aspects. |
650
|
|
▼aIT in Business. |
650
|
|
▼aRisk Management. |
650
|
|
▼aData and Information Security. |
650
|
|
▼aArtificial Intelligence. |
650
|
|
▼aInformation Ethics. |
700
|
|
▼aHuang, Ken.▼eeditor.▼0(orcid)0009-0004-6502-3673▼1https://orcid.org/0009-0004-6502-3673▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aWang, Yang.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aGoertzel, Ben.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aLi, Yale.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aWright, Sean.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aPonnapalli, Jyoti.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9783031542510 |
776
|
|
▼iPrinted edition:▼z9783031542534 |
776
|
|
▼iPrinted edition:▼z9783031542541 |
830
|
|
▼aFuture of Business and Finance,▼x2662-2475 |
856
|
|
▼uhttps://doi.org/10.1007/978-3-031-54252-7 |
912
|
|
▼aZDB-2-BUM |
912
|
|
▼aZDB-2-SXBM |
950
|
|
▼aBusiness and Management (SpringerNature-41169) |
950
|
|
▼aBusiness and Management (R0) (SpringerNature-43719) |