Chapter
Licensed
Unlicensed
Requires Authentication
Chapter 2: AI Trust, Compliance, and Security
-
Aditya K. Sood
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xiii
- Acknowledgments xix
- About the Author xxi
- Chapter 1: Introduction to AI: LLMs, GenAI Applications, and the AI Infrastructure 1
- Chapter 2: AI Trust, Compliance, and Security 43
- Chapter 3: The AI Threat Landscape: Dissecting the Risks and Attack Vectors 65
- Chapter 4: Threats and Attacks Targeting the AI Ecosystem: Real-world Case Studies 103
- Chapter 5: Security Assessment of LLMs, GenAI Applications, and the AI Infrastructure 135
- Chapter 6: Defending LLMs, GenAI Applications, and the AI Infrastructure Against Cyberattacks 197
- Appendix: Machine Learning /AI Terms 219
- Index 227
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xiii
- Acknowledgments xix
- About the Author xxi
- Chapter 1: Introduction to AI: LLMs, GenAI Applications, and the AI Infrastructure 1
- Chapter 2: AI Trust, Compliance, and Security 43
- Chapter 3: The AI Threat Landscape: Dissecting the Risks and Attack Vectors 65
- Chapter 4: Threats and Attacks Targeting the AI Ecosystem: Real-world Case Studies 103
- Chapter 5: Security Assessment of LLMs, GenAI Applications, and the AI Infrastructure 135
- Chapter 6: Defending LLMs, GenAI Applications, and the AI Infrastructure Against Cyberattacks 197
- Appendix: Machine Learning /AI Terms 219
- Index 227