Computers & Internet Books:

The Developer's Playbook for Large Language Model Security

Building Secure AI Applications
Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!

Format:

Paperback / softback
$126.99 was $164.99
Releases

Pre-order to reserve stock from our first shipment. Your credit card will not be charged until your order is ready to ship.

Available for pre-order now

Buy Now, Pay Later with:

4 payments of $31.75 with Afterpay Learn more

Pre-order Price Guarantee

If you pre-order an item and the price drops before the release date, you'll pay the lowest price. This happens automatically when you pre-order and pay by credit card.

If paying by PayPal, Afterpay, Zip or internet banking, and the price drops after you have paid, you can ask for the difference to be refunded.

If Mighty Ape's price changes before release, you'll pay the lowest price.

Availability

This product will be released on

Delivering to:

It should arrive:

  • 7-14 October using International Courier

Description

Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list—a feat accomplished by more than 400 industry experts—this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI. You'll learn: Why LLMs present unique security challenges How to navigate the many risk conditions associated with using LLM technology The threat landscape pertaining to LLMs and the critical trust boundaries that must be maintained How to identify the top risks and vulnerabilities associated with LLMs Methods for deploying defenses to protect against attacks on top vulnerabilities Ways to actively manage critical trust boundaries on your systems to ensure secure execution and risk minimization

Author Biography:

Steve Wilson is a recognized leader in the emerging field of security for Large Language Models (LLMs). In his role as head of the open-source "Top 10 List for LLM Applications" at the Open Web Application Security Project (OWASP) Foundation, Steve built a team of over 400 experts who contributed to the creation of the first industry-standard, comprehensive look at security threats to applications using LLM technology. In his role as Chief Product Officer at Contrast Security, Steve owns all Product Development for a highly recognized company providing code security technology to the world's largest, most security conscious organizations. Steve has over 25 years of experience building software platforms at multi-billion-dollar technology companies such as Citrix, Oracle and Sun Microsystems. Steve is the author of "Java Platform Performance: Strategies and Tactics" and "The Father/Daughter Guide to Cryptocurrency Mining" series. He is a popular speaker on future of work and artificial intelligence topics and has recently presented at RSA, The Churchill Club, Silicon Valley Leadership Group, DLA Piper Global Technology Summit, IDG Agenda, SAP TechEd and WSJ Tech D.Live.
Release date Australia
September 30th, 2024
Author
Pages
250
Audience
  • Technical / Manuals
ISBN-13
9781098162207
Product ID
38761866

Customer previews

Nobody has previewed this product yet. You could be the first!

Write a Preview

Help & options

Filed under...