ODBIERZ TWÓJ BONUS :: »

    Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to threat modeling and securing AI with MLSecOps

    (ebook) (audiobook) (audiobook) Język publikacji: angielski
    Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to threat modeling and securing AI with MLSecOps John Sotiropoulos - okładka ebooka

    Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to threat modeling and securing AI with MLSecOps John Sotiropoulos - okładka ebooka

    Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to threat modeling and securing AI with MLSecOps John Sotiropoulos - okładka audiobooka MP3

    Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to threat modeling and securing AI with MLSecOps John Sotiropoulos - okładka audiobooks CD

    Ocena:
    Bądź pierwszym, który oceni tę książkę
    Stron:
    674
    Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips cybersecurity professionals with the skills to secure AI technologies, moving beyond research hype or business-as-usual strategies.
    The strategy-based book is a comprehensive guide to AI security, presenting a structured approach with practical examples to identify and counter adversarial attacks. This book goes beyond a random selection of threats and consolidates recent research and industry standards, incorporating taxonomies from MITRE, NIST, and OWASP. Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. To gain deeper insights, you’ll cover examples of incorporating CI, MLOps, and security controls, including open-access LLMs and ML SBOMs. Based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI.
    By the end of this book, you’ll be able to develop, deploy, and secure AI systems effectively.

    Wybrane bestsellery

    O autorze ebooka

    John Sotiropoulos is a Senior Security Architect at Kainos where he is responsible for AI Security and works to secure national-scale systems in government, regulators, and healthcare. John has gained extensive experience in building and securing systems through roles such as Developer, CTO, VP of Engineering, and Chief Architect.
    A Core Team member of the OWASP Top 10 for LLM Apps and AI Exchange, he leads standards alignment for both projects with other standards organizations and national cybersecurity agencies. He is the OWASP lead at the US AI Safety Institute Consortium and part of the Task Force on Deepfake detection.
    An avid geek and marathon runner, he is passionate about enabling builders and defenders to create a safer future.

    Zamknij

    Wybierz metodę płatności

    Zamknij Pobierz aplikację mobilną Ebookpoint