×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps John Sotiropoulos

(ebook) (audiobook) (audiobook) Książka w języku 1
Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps John Sotiropoulos - okladka książki

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps John Sotiropoulos - okladka książki

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps John Sotiropoulos - audiobook MP3

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps John Sotiropoulos - audiobook CD

Autor:
John Sotiropoulos
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
586
Dostępne formaty:
     PDF
     ePub

Ebook (125,10 zł najniższa cena z 30 dni)

139,00 zł (-10%)
125,10 zł

Dodaj do koszyka lub Kup na prezent Kup 1-kliknięciem

(125,10 zł najniższa cena z 30 dni)

Przenieś na półkę

Do przechowalni

Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips you with the skills to secure AI technologies, moving beyond research hype or business-as-usual activities.
This strategy-based book is a comprehensive guide to AI security, presenting you with a structured approach with practical examples to identify and counter adversarial attacks. In Part 1, you’ll touch on getting started with AI and learn about adversarial attacks, before Parts 2, 3 and 4 move through different adversarial attack methods, exploring how each type of attack is performed and how you can defend your AI system against it. Part 5 is dedicated to introducing secure-by-design AI strategy, including threat modeling and MLSecOps and consolidating recent research, industry standards and taxonomies such as OWASP and NIST. Finally, based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI.
By the end of this book, you’ll be able to develop, deploy, and secure AI systems against the threat of adversarial attacks effectively.

Wybrane bestsellery

O autorze książki

John Sotiropoulos is a Senior Security Architect at Kainos where he is responsible for AI Security and works to secure national-scale systems in government, regulators, and healthcare. John has gained extensive experience in building and securing systems through roles such as Developer, CTO, VP of Engineering, and Chief Architect.
A Core Team member of the OWASP Top 10 for LLM Apps and AI Exchange, he leads standards alignment for both projects with other standards organizations and national cybersecurity agencies. He is the OWASP lead at the US AI Safety Institute Consortium and part of the Task Force on Deepfake detection.
An avid geek and marathon runner, he is passionate about enabling builders and defenders to create a safer future.

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
125,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.