000 01700 a2200193 4500
003 OSt
005 20250714164600.0
008 250709b |||||||| |||| 00| 0 eng d
020 _a9783031542510
082 _a006.32
_bG286
245 _aGenerative AI security
_btheories and practices
_cedited by Ken Huang.... [et al]
260 _bSpringer
_c2024
_aSwitzerland
300 _axxxv, 338p
440 _aFuture of business and finance
520 _aThis book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications.
650 _aGenerative AI (GenAI)
_aCybersecurity
_aComputer security
_aArtificial intelligence security measures
700 _aHuang, Ken [Ed.]
_aGoertzel, Ben [Ed.]
_aWright, Sean [Ed.]
_aWang, Yang [Ed.]
_aLi, Yale [Ed.]
_aPonnapalli, Jyoti [Ed.]
942 _cBK
999 _c567556
_d567556