نام کتاب
AI-Native LLM Security

Threats, defenses, and best practices for building safe and trustworthy AI

Vaibhav Malik, Ken Huang, Ads Dawson

Paperback416 Pages
PublisherPackt
Edition1
LanguageEnglish
Year2025
ISBN9781836203759
876
A6569
انتخاب نوع چاپ:
جلد سخت
688,000ت
0
جلد نرم
628,000ت
0
طلق پاپکو و فنر
638,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:دارای متن و کادر رنگی
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#AI-Native

#LLM

#AI-Native

#Security

#AI

#OWASP

#NIST

#MLOps

توضیحات

Key Features

  • Understand adversarial AI attacks to strengthen your AI security posture effectively
  • Leverage insights from LLM security experts to navigate emerging threats and challenges
  • Implement secure-by-design strategies and MLSecOps practices for robust AI system protection


Book Description

Adversarial AI attacks present a unique set of security challenges, exploiting the very foundation of how AI learns. This book explores these threats in depth, equipping cybersecurity professionals with the tools needed to secure generative AI and LLM applications. Rather than skimming the surface of emerging risks, it focuses on practical strategies, industry standards, and recent research to build a robust defense framework.


Structured around actionable insights, the chapters introduce a secure-by-design methodology, integrating threat modeling and MLSecOps practices to fortify AI systems. You’ll discover how to leverage established taxonomies from OWASP, NIST, and MITRE to identify and mitigate vulnerabilities. Through real-world examples, the book highlights best practices for incorporating security controls into AI development life cycles, covering key areas such as CI/CD, MLOps, and open-access LLMs.


Built on the expertise of its co-authors—pioneers in the OWASP Top 10 for LLM applications—this guide also addresses the ethical implications of AI security, contributing to the broader conversation on trustworthy AI. By the end of this book, you’ll be able to develop, deploy, and secure AI technologies with confidence and clarity.


What you Will Learn

  • Understand unique security risks posed by LLMs
  • Identify vulnerabilities and attack vectors using threat modeling
  • Detect and respond to security incidents in operational LLM deployments
  • Navigate the complex legal and ethical landscape of LLM security
  • Develop strategies for ongoing governance and continuous improvement
  • Mitigate risks across the LLM life cycle, from data curation to operations
  • Design secure LLM architectures with isolation and access controls


Who this Book is for

This book is essential for cybersecurity professionals, AI practitioners, and leaders responsible for developing and securing AI systems powered by large language models. Ideal for CISOs, security architects, ML engineers, data scientists, and DevOps professionals, it provides insights on securing AI applications. Managers and executives overseeing AI initiatives will also benefit from understanding the risks and best practices outlined in this guide to ensure the integrity of their AI projects. A basic understanding of security concepts and AI fundamentals is assumed.


Table of Contents

Part 1: Foundations of LLM Security

Chapter 1: Fundamentals and Introduction to Large Language Models

Chapter 2: Securing Large Language Models

Chapter 3: The Dual Nature of LLM Risks: Inherent Vulnerabilities and Malicious Actors

Chapter 4: Mapping Trust Boundaries in LLM Architectures

Chapter 5: Aligning LLM Security with Organizational Objectives and Regulatory Landscapes

Part 2: The OWASP Top 10 for LLM Applications

Chapter 6: Identifying and Prioritizing LLM Security Risks with OWASP

Chapter 7: Diving Deep: Profiles of the Top 10 LLM Security Risks

Chapter 8: Mitigating LLM Risks: Strategies and Techniques for Each OWASP Category

Chapter 9: Adapting the OWASP Top 10 to Diverse Deployment Scenarios

Part 3: Building Secure LLM Systems

Chapter 10: Designing LLM Systems for Security: Architecture, Controls, and Best Practices

Chapter 11: Integrating Security into the LLM Development Life Cycle: From Data Curation to Deployment

Chapter 12: Operational Resilience: Monitoring, Incident Response, and Continuous Improvement

Chapter 13: The Future of LLM Security: Emerging Threats, Promising Defenses, and the Path Forward


About the Authors

Vaibhav Malik is a security leader with over 14 years of experience in industry. He partners with global technology leaders to architect and deploy comprehensive security solutions for enterprise clients worldwide. As a recognized thought leader in Zero Trust Security Architecture, Vaibhav brings deep expertise from previous roles at leading service providers and security companies, where he guided Fortune 500 organizations through complex network, security, and cloud transformation initiatives. Vaibhav champions an identity and data-centric approach to cybersecurity and is a frequent speaker at industry conferences. He holds a Master's degree in Networking from the University of Colorado Boulder, an MBA from the University of Illinois Urbana-Champaign, and maintains his CISSP certification. His extensive hands-on experience and strategic vision make him a trusted advisor for organizations navigating today's evolving threat landscape and implementing modern security architectures.


Ken Huang is a prolific author and renowned expert in AI and Web3, with numerous published books spanning business and technical guides as well as cutting-edge research. He is a Research Fellow and Co-Chair of the AI Safety Working Groups at the Cloud Security Alliance, Co-Chair of the OWASP AIVSS project, and Co-Chair of the AI STR Working Group at the World Digital Technology Academy. He is also an Adjunct Professor at the University of San Francisco, where he teaches a graduate course on Generative AI for Data Security. Huang serves as CEO and Chief AI Officer (CAIO) of DistributedApps.ai, a firm specializing in generative AI-related training and consulting. His technical leadership is further reflected in his role as a core contributor to OWASP's Top 10 Risks for LLM Applications and his participation in the NIST Generative AI Public Working Group. A globally sought-after speaker, Ken has presented at events hosted by RSA, OWASP, ISC2, Davos WEF, ACM, IEEE, Consensus, the CSA AI Summit, the Depository Trust & Clearing Corporation, and the World Bank. He is also a member of the OpenAI Forum, contributing to global dialogue on secure and responsible AI development.


Ads Dawson is a self-described “meticulous dude” who lives by the philosophy: Harness code to conjure creative chaos—think evil; do good. He is a recognized expert in offensive AI security, specializing in adversarial machine learning exploitation and autonomous red teaming, with a talent for demonstrating capabilities in offensive security focused tasks using agents. As Staff AI Security Researcher at Dreadnode and founding Technical Lead for the OWASP LLM Applications Project, he architects next-gen evaluation harnesses for cyber operations and AI red teaming. Located in Toronto, Canada and an avid bug bounty hunter, he bridges traditional AppSec with cutting-edge AI vulnerability research, positioning him among the few experts capable of conducting full-spectrum adversarial assessments across AI-integrated critical systems.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
Artificial intelligence
907
Managing AI in the Enterprise
416,000 تومان
Artificial intelligence
935
DeepFakes
354,000 تومان
Artificial intelligence
972
Artificial Intelligence
1,335,000 تومان
Artificial intelligence
976
Productionizing AI
599,000 تومان
Artificial intelligence
1,103
Democratizing Artificial Intelligence with UiPath
585,000 تومان
NET.
1,023
IoT, AI, and Blockchain for .NET
524,000 تومان
Artificial intelligence
744
Introduction to Generative AI
903,000 تومان
Artificial intelligence
1,003
Architecting AI Software Systems
404,000 تومان
Artificial intelligence
940
AI for Sports
333,000 تومان
Artificial intelligence
957
Generative AI
401,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©