The developer's playbook for large language model security: building secure AI applications
"Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschew...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing
O'Reilly
©2024
|
Ausgabe: | First edition |
Schlagworte: | |
Zusammenfassung: | "Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list -- a feat accomplished by more than 400 industry experts -- this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI. You'll learn : Why LLMs present unique security challenges ; How to navigate the many risk conditions associated with using LLM technology ; The threat landscape pertaining to LLMs and the critical trust boundaries that must be maintained ; How to identify the top risks and vulnerabilities associated with LLMs ; Methods for deploying defenses to protect against attacks on top vulnerabilities ; Ways to actively manage critical trust boundaries on your systems to ensure secure execution and risk minimization"-- |
Beschreibung: | Illustrator statement of responsibility from title page verso. - Includes index |
Beschreibung: | xvi, 180 pages color illustrations 24 cm |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049899385 | ||
003 | DE-604 | ||
007 | t | ||
008 | 241009s2024 a||| |||| 00||| eng d | ||
020 | |z 9781098162207 |9 978-1-09-816220-7 | ||
020 | |z 109816220X |9 1-09-816220-X | ||
035 | |a (DE-599)BVBBV049899385 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
100 | 1 | |a Wilson, Steve author |e Verfasser |4 aut | |
245 | 1 | 0 | |a The developer's playbook for large language model security |b building secure AI applications |c Steve Wilson ; illustrator, Kate Dullea |
250 | |a First edition | ||
264 | 1 | |a Beijing |b O'Reilly |c ©2024 | |
300 | |a xvi, 180 pages |b color illustrations |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
336 | |b sti |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Illustrator statement of responsibility from title page verso. - Includes index | ||
520 | |a "Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list -- a feat accomplished by more than 400 industry experts -- this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI. You'll learn : Why LLMs present unique security challenges ; How to navigate the many risk conditions associated with using LLM technology ; The threat landscape pertaining to LLMs and the critical trust boundaries that must be maintained ; How to identify the top risks and vulnerabilities associated with LLMs ; Methods for deploying defenses to protect against attacks on top vulnerabilities ; Ways to actively manage critical trust boundaries on your systems to ensure secure execution and risk minimization"-- | ||
650 | 4 | |a Artificial intelligence / Computer programs / Security measures | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Natural language generation (Computer science) | |
650 | 4 | |a Intelligence artificielle / Logiciels / Sécurité / Mesures | |
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
650 | 4 | |a Génération automatique de texte | |
700 | 1 | |a Dullea, Kate author |e Sonstige |4 oth | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035238376 |
Datensatz im Suchindex
_version_ | 1812438070275866624 |
---|---|
adam_text | |
any_adam_object | |
author | Wilson, Steve author |
author_facet | Wilson, Steve author |
author_role | aut |
author_sort | Wilson, Steve author |
author_variant | s a w sa saw |
building | Verbundindex |
bvnumber | BV049899385 |
ctrlnum | (DE-599)BVBBV049899385 |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049899385</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">241009s2024 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781098162207</subfield><subfield code="9">978-1-09-816220-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">109816220X</subfield><subfield code="9">1-09-816220-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049899385</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilson, Steve author</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The developer's playbook for large language model security</subfield><subfield code="b">building secure AI applications</subfield><subfield code="c">Steve Wilson ; illustrator, Kate Dullea</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">©2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 180 pages</subfield><subfield code="b">color illustrations</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">sti</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Illustrator statement of responsibility from title page verso. - Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list -- a feat accomplished by more than 400 industry experts -- this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI. You'll learn : Why LLMs present unique security challenges ; How to navigate the many risk conditions associated with using LLM technology ; The threat landscape pertaining to LLMs and the critical trust boundaries that must be maintained ; How to identify the top risks and vulnerabilities associated with LLMs ; Methods for deploying defenses to protect against attacks on top vulnerabilities ; Ways to actively manage critical trust boundaries on your systems to ensure secure execution and risk minimization"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence / Computer programs / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Natural language generation (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle / Logiciels / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Génération automatique de texte</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dullea, Kate author</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035238376</subfield></datafield></record></collection> |
id | DE-604.BV049899385 |
illustrated | Illustrated |
indexdate | 2024-10-09T12:07:17Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035238376 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xvi, 180 pages color illustrations 24 cm |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | O'Reilly |
record_format | marc |
spelling | Wilson, Steve author Verfasser aut The developer's playbook for large language model security building secure AI applications Steve Wilson ; illustrator, Kate Dullea First edition Beijing O'Reilly ©2024 xvi, 180 pages color illustrations 24 cm txt rdacontent sti rdacontent n rdamedia nc rdacarrier Illustrator statement of responsibility from title page verso. - Includes index "Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list -- a feat accomplished by more than 400 industry experts -- this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI. You'll learn : Why LLMs present unique security challenges ; How to navigate the many risk conditions associated with using LLM technology ; The threat landscape pertaining to LLMs and the critical trust boundaries that must be maintained ; How to identify the top risks and vulnerabilities associated with LLMs ; Methods for deploying defenses to protect against attacks on top vulnerabilities ; Ways to actively manage critical trust boundaries on your systems to ensure secure execution and risk minimization"-- Artificial intelligence / Computer programs / Security measures Computer networks / Security measures Natural language generation (Computer science) Intelligence artificielle / Logiciels / Sécurité / Mesures Réseaux d'ordinateurs / Sécurité / Mesures Génération automatique de texte Dullea, Kate author Sonstige oth |
spellingShingle | Wilson, Steve author The developer's playbook for large language model security building secure AI applications Artificial intelligence / Computer programs / Security measures Computer networks / Security measures Natural language generation (Computer science) Intelligence artificielle / Logiciels / Sécurité / Mesures Réseaux d'ordinateurs / Sécurité / Mesures Génération automatique de texte |
title | The developer's playbook for large language model security building secure AI applications |
title_auth | The developer's playbook for large language model security building secure AI applications |
title_exact_search | The developer's playbook for large language model security building secure AI applications |
title_full | The developer's playbook for large language model security building secure AI applications Steve Wilson ; illustrator, Kate Dullea |
title_fullStr | The developer's playbook for large language model security building secure AI applications Steve Wilson ; illustrator, Kate Dullea |
title_full_unstemmed | The developer's playbook for large language model security building secure AI applications Steve Wilson ; illustrator, Kate Dullea |
title_short | The developer's playbook for large language model security |
title_sort | the developer s playbook for large language model security building secure ai applications |
title_sub | building secure AI applications |
topic | Artificial intelligence / Computer programs / Security measures Computer networks / Security measures Natural language generation (Computer science) Intelligence artificielle / Logiciels / Sécurité / Mesures Réseaux d'ordinateurs / Sécurité / Mesures Génération automatique de texte |
topic_facet | Artificial intelligence / Computer programs / Security measures Computer networks / Security measures Natural language generation (Computer science) Intelligence artificielle / Logiciels / Sécurité / Mesures Réseaux d'ordinateurs / Sécurité / Mesures Génération automatique de texte |
work_keys_str_mv | AT wilsonsteveauthor thedevelopersplaybookforlargelanguagemodelsecuritybuildingsecureaiapplications AT dulleakateauthor thedevelopersplaybookforlargelanguagemodelsecuritybuildingsecureaiapplications |