Generative AI security (Record no. 567556)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01700 a2200193 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250714164600.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250709b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031542510 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 006.32 |
Item number | G286 |
245 ## - TITLE STATEMENT | |
Title | Generative AI security |
Remainder of title | theories and practices |
Statement of responsibility, etc | edited by Ken Huang.... [et al] |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher | Springer |
Year of publication | 2024 |
Place of publication | Switzerland |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xxxv, 338p |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE | |
Title | Future of business and finance |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity.<br/>The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Generative AI (GenAI) |
-- | Cybersecurity |
-- | Computer security |
-- | Artificial intelligence security measures |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Huang, Ken [Ed.] |
-- | Goertzel, Ben [Ed.] |
-- | Wright, Sean [Ed.] |
-- | Wang, Yang [Ed.] |
-- | Li, Yale [Ed.] |
-- | Ponnapalli, Jyoti [Ed.] |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Accession Number | Cost, replacement price | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
In Acquisition | PK Kelkar Library, IIT Kanpur | PK Kelkar Library, IIT Kanpur | 09/07/2025 | 2 | 7563.74 | A186907 | 10084.99 | Books |