LEADER 04404nam 22007815 450 001 9910847580503321 005 20240405125406.0 010 $a9783031542527 010 $a3031542525 024 7 $a10.1007/978-3-031-54252-7 035 $a(CKB)31403859000041 035 $a(MiAaPQ)EBC31267138 035 $a(Au-PeEL)EBL31267138 035 $a(MiAaPQ)EBC31253965 035 $a(Au-PeEL)EBL31253965 035 $a(DE-He213)978-3-031-54252-7 035 $a(OCoLC)1429599288 035 $a(EXLCZ)9931403859000041 100 $a20240405d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGenerative AI Security $eTheories and Practices /$fedited by Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright, Jyoti Ponnapalli 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (367 pages) 225 1 $aFuture of Business and Finance,$x2662-2475 311 08$a9783031542510 311 08$a3031542517 327 $aFoundations of Generative AI -- Navigating the GenAI Security -- AI Regulations -- Build Your Security Program for GenAI -- GenAI Data Security -- GenAI Model Security -- GenAI Application Level Security -- From LLMOps to DevSecOps for GenAI -- Utilizing Prompt Engineering to Operationalize Cyber Security -- Use GenAI Tools to Boost Your Security Posture. 330 $aThis book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI?s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program. The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity. 410 0$aFuture of Business and Finance,$x2662-2475 606 $aBusiness information services 606 $aFinancial risk management 606 $aData protection 606 $aArtificial intelligence 606 $aInformation technology$xMoral and ethical aspects 606 $aIT in Business 606 $aRisk Management 606 $aData and Information Security 606 $aArtificial Intelligence 606 $aInformation Ethics 615 0$aBusiness information services. 615 0$aFinancial risk management. 615 0$aData protection. 615 0$aArtificial intelligence. 615 0$aInformation technology$xMoral and ethical aspects. 615 14$aIT in Business. 615 24$aRisk Management. 615 24$aData and Information Security. 615 24$aArtificial Intelligence. 615 24$aInformation Ethics. 676 $a005.8 700 $aHuang$b Ken$01736274 701 $aWang$b Yang$01253130 701 $aGoertzel$b Ben$0726875 701 $aLi$b Yale$01736275 701 $aWright$b Sean$01736276 701 $aPonnapalli$b Jyoti$01736277 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910847580503321 996 $aGenerative AI Security$94156144 997 $aUNINA