MARC details
000 -LEADER |
fixed length control field |
02494nam a22002777a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20241222123448.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
241222b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783031542510 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.3 |
Item number |
HUA |
245 ## - TITLE STATEMENT |
Title |
Generative AI security: |
Remainder of title |
theories and practices |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc. |
Springer |
Place of publication, distribution, etc. |
Switzerland |
Date of publication, distribution, etc. |
2024 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxv, 338 p. |
365 ## - TRADE PRICE |
Price type code |
EURO |
Price amount |
99.99 |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity.<br/><br/>The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program.<br/><br/>The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity.<br/><br/>(https://link.springer.com/book/10.1007/978-3-031-54252-7) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Model security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
ChatGPT |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Artificial intelligence--Ethical and moral aspects |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Huang, Ken [Editor] |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Wang, Yang [Editor] |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Goertzel, Ben [Editor] |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Li, Yale [Editor] |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Wright, Sean [Editor] |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Ponnapalli, Jyoti [Editor] |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Book |
Source of classification or shelving scheme |
Dewey Decimal Classification |