Generative AI Security: Theories and Practices
Gespeichert in:
Weitere Verfasser: | , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer Nature Switzerland
2024
Cham Springer |
Ausgabe: | 1st ed. 2024 |
Schriftenreihe: | Future of Business and Finance
|
Schlagworte: | |
Online-Zugang: | DE-522 DE-B768 DE-634 DE-1043 DE-1102 DE-1046 DE-858 DE-Aug4 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-860 DE-1049 DE-861 DE-863 DE-862 DE-523 DE-2070s DE-91 DE-19 DE-703 DE-706 DE-824 DE-739 Volltext |
Beschreibung: | 1 Online-Ressource (XXXV, 338 p. 44 illus., 34 illus. in color) |
ISBN: | 9783031542527 |
ISSN: | 2662-2475 |
DOI: | 10.1007/978-3-031-54252-7 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV049673884 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240503s2024 xx o|||| 00||| eng d | ||
020 | |a 9783031542527 |c Online |9 978-3-031-54252-7 | ||
024 | 7 | |a 10.1007/978-3-031-54252-7 |2 doi | |
035 | |a (ZDB-2-BUM)9783031542527 | ||
035 | |a (OCoLC)1437841643 | ||
035 | |a (DE-599)BVBBV049673884 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-860 |a DE-91 |a DE-19 |a DE-83 |a DE-858 |a DE-1046 |a DE-1043 |a DE-B768 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-1049 |a DE-863 |a DE-1051 |a DE-862 |a DE-92 |a DE-824 |a DE-2070s |a DE-522 |a DE-573 |a DE-M347 |a DE-1102 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 658.05 |2 23 | |
084 | |a WIR 000 |2 stub | ||
245 | 1 | 0 | |a Generative AI Security |b Theories and Practices |c edited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli |
250 | |a 1st ed. 2024 | ||
264 | 1 | |a Cham |b Springer Nature Switzerland |c 2024 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (XXXV, 338 p. 44 illus., 34 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Future of Business and Finance |x 2662-2475 | |
650 | 4 | |a IT in Business | |
650 | 4 | |a Risk Management | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Information Ethics | |
650 | 4 | |a Business information services | |
650 | 4 | |a Financial risk management | |
650 | 4 | |a Data protection | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Information technology / Moral and ethical aspects | |
700 | 1 | |a Huang, Ken |4 edt | |
700 | 1 | |a Wang, Yang |4 edt | |
700 | 1 | |a Goertzel, Ben |4 edt | |
700 | 1 | |a Li, Yale |4 edt | |
700 | 1 | |a Wright, Sean |4 edt | |
700 | 1 | |a Ponnapalli, Jyoti |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-54251-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-54253-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-54254-1 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-54252-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-BUM | ||
940 | 1 | |q ZDB-2-BUM_2024 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035016831 | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-522 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-B768 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-634 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-1043 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-1102 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-1046 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-858 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-Aug4 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-573 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-M347 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-92 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-1051 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-898 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-860 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-1049 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-861 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-863 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-862 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-523 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-2070s |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-91 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-19 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-703 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-706 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-824 |p ZDB-2-BUM |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54252-7 |l DE-739 |p ZDB-2-BUM |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1072633 |
---|---|
_version_ | 1819651929917095936 |
adam_text | |
any_adam_object | |
author2 | Huang, Ken Wang, Yang Goertzel, Ben Li, Yale Wright, Sean Ponnapalli, Jyoti |
author2_role | edt edt edt edt edt edt |
author2_variant | k h kh y w yw b g bg y l yl s w sw j p jp |
author_facet | Huang, Ken Wang, Yang Goertzel, Ben Li, Yale Wright, Sean Ponnapalli, Jyoti |
building | Verbundindex |
bvnumber | BV049673884 |
classification_tum | WIR 000 |
collection | ZDB-2-BUM |
ctrlnum | (ZDB-2-BUM)9783031542527 (OCoLC)1437841643 (DE-599)BVBBV049673884 |
dewey-full | 658.05 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.05 |
dewey-search | 658.05 |
dewey-sort | 3658.05 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
doi_str_mv | 10.1007/978-3-031-54252-7 |
edition | 1st ed. 2024 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV049673884</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240503s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031542527</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-54252-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-54252-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-BUM)9783031542527</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1437841643</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049673884</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-B768</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-2070s</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.05</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Generative AI Security</subfield><subfield code="b">Theories and Practices</subfield><subfield code="c">edited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer Nature Switzerland</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXXV, 338 p. 44 illus., 34 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Future of Business and Finance</subfield><subfield code="x">2662-2475</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT in Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Ethics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business information services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Financial risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Moral and ethical aspects</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Huang, Ken</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Yang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goertzel, Ben</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Yale</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wright, Sean</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ponnapalli, Jyoti</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-54251-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-54253-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-54254-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-BUM</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-BUM_2024</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035016831</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-B768</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-1102</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-1051</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54252-7</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-BUM</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049673884 |
illustrated | Not Illustrated |
indexdate | 2024-12-28T04:08:30Z |
institution | BVB |
isbn | 9783031542527 |
issn | 2662-2475 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035016831 |
oclc_num | 1437841643 |
open_access_boolean | |
owner | DE-703 DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-83 DE-858 DE-1046 DE-1043 DE-B768 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-1049 DE-863 DE-BY-FWS DE-1051 DE-862 DE-BY-FWS DE-92 DE-824 DE-2070s DE-522 DE-573 DE-M347 DE-1102 DE-706 DE-739 DE-634 |
owner_facet | DE-703 DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-83 DE-858 DE-1046 DE-1043 DE-B768 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-1049 DE-863 DE-BY-FWS DE-1051 DE-862 DE-BY-FWS DE-92 DE-824 DE-2070s DE-522 DE-573 DE-M347 DE-1102 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XXXV, 338 p. 44 illus., 34 illus. in color) |
psigel | ZDB-2-BUM ZDB-2-BUM_2024 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Springer Nature Switzerland Springer |
record_format | marc |
series2 | Future of Business and Finance |
spellingShingle | Generative AI Security Theories and Practices IT in Business Risk Management Data and Information Security Artificial Intelligence Information Ethics Business information services Financial risk management Data protection Artificial intelligence Information technology / Moral and ethical aspects |
title | Generative AI Security Theories and Practices |
title_auth | Generative AI Security Theories and Practices |
title_exact_search | Generative AI Security Theories and Practices |
title_full | Generative AI Security Theories and Practices edited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli |
title_fullStr | Generative AI Security Theories and Practices edited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli |
title_full_unstemmed | Generative AI Security Theories and Practices edited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli |
title_short | Generative AI Security |
title_sort | generative ai security theories and practices |
title_sub | Theories and Practices |
topic | IT in Business Risk Management Data and Information Security Artificial Intelligence Information Ethics Business information services Financial risk management Data protection Artificial intelligence Information technology / Moral and ethical aspects |
topic_facet | IT in Business Risk Management Data and Information Security Artificial Intelligence Information Ethics Business information services Financial risk management Data protection Artificial intelligence Information technology / Moral and ethical aspects |
url | https://doi.org/10.1007/978-3-031-54252-7 |
work_keys_str_mv | AT huangken generativeaisecuritytheoriesandpractices AT wangyang generativeaisecuritytheoriesandpractices AT goertzelben generativeaisecuritytheoriesandpractices AT liyale generativeaisecuritytheoriesandpractices AT wrightsean generativeaisecuritytheoriesandpractices AT ponnapallijyoti generativeaisecuritytheoriesandpractices |