Get Free Shipping on orders over $79
The Developer's Playbook for Large Language Model Security : Building Secure AI Applications - Steve  Wilson

The Developer's Playbook for Large Language Model Security

Building Secure AI Applications

By: Steve Wilson

eText | 3 September 2024 | Edition Number 1

At a Glance

eText


$85.79

or 4 interest-free payments of $21.45 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.

Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list—a feat accomplished by more than 400 industry experts—this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI.

You'll learn:

  • Why LLMs present unique security challenges
  • How to navigate the many risk conditions associated with using LLM technology
  • The threat landscape pertaining to LLMs and the critical trust boundaries that must be maintained
  • How to identify the top risks and vulnerabilities associated with LLMs
  • Methods for deploying defenses to protect against attacks on top vulnerabilities
  • Ways to actively manage critical trust boundaries on your systems to ensure secure execution and risk minimization
on
Desktop
Tablet
Mobile

More in Artificial Intelligence

AI-Powered Search - Trey Grainger

eBOOK

Medium Hot : Images in the Age of Heat - Hito Steyerl

eBOOK

RRP $22.66

$18.99

16%
OFF
AI Futures - Evgeny Morozov

eBOOK

RRP $16.88

$13.99

17%
OFF
Where the Axe is Buried - Ray Nayler

eBOOK

HBR Guide to Generative AI for Managers : HBR Guide - Elisa Farri

eBOOK