Chapter
Licensed
Unlicensed
Requires Authentication
Chapter 5: Security Assessment of LLMs, GenAI Applications, and the AI Infrastructure
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xiii
- Acknowledgments xix
- About the Author xxi
- Chapter 1: Introduction to AI: LLMs, GenAI Applications, and the AI Infrastructure 1
- Chapter 2: AI Trust, Compliance, and Security 43
- Chapter 3: The AI Threat Landscape: Dissecting the Risks and Attack Vectors 65
- Chapter 4: Threats and Attacks Targeting the AI Ecosystem: Real-world Case Studies 103
- Chapter 5: Security Assessment of LLMs, GenAI Applications, and the AI Infrastructure 135
- Chapter 6: Defending LLMs, GenAI Applications, and the AI Infrastructure Against Cyberattacks 197
- Appendix: Machine Learning /AI Terms 219
- Index 227
Chapters in this book
- Frontmatter i
- Contents vii
- Preface xiii
- Acknowledgments xix
- About the Author xxi
- Chapter 1: Introduction to AI: LLMs, GenAI Applications, and the AI Infrastructure 1
- Chapter 2: AI Trust, Compliance, and Security 43
- Chapter 3: The AI Threat Landscape: Dissecting the Risks and Attack Vectors 65
- Chapter 4: Threats and Attacks Targeting the AI Ecosystem: Real-world Case Studies 103
- Chapter 5: Security Assessment of LLMs, GenAI Applications, and the AI Infrastructure 135
- Chapter 6: Defending LLMs, GenAI Applications, and the AI Infrastructure Against Cyberattacks 197
- Appendix: Machine Learning /AI Terms 219
- Index 227