The Developer's Playbook for Large Language Model Security: Building Secure AI Applications by Wilson, Steve

The Developer's Playbook for Large Language Model Security: Building Secure AI Applications

Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new...
¥11,692 JPY
¥11,692 JPY
SKU: 9781098162207
Product Type: Books
Please hurry! Only 0 left in stock
Author: Steve Wilson
Format: Paperback
Language: English
Subtotal: ¥11,692
10 customers are viewing this product
The Developer's Playbook for Large Language Model Security: Building Secure AI Applications by Wilson, Steve

The Developer's Playbook for Large Language Model Security: Building Secure AI Applications

¥11,692

The Developer's Playbook for Large Language Model Security: Building Secure AI Applications

¥11,692
Author: Steve Wilson
Format: Paperback
Language: English

Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.

Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list--a feat accomplished by more than 400 industry experts--this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI.

You'll learn:

  • Why LLMs present unique security challenges
  • How to navigate the many risk conditions associated with using LLM technology
  • The threat landscape pertaining to LLMs and the critical trust boundaries that must be maintained
  • How to identify the top risks and vulnerabilities associated with LLMs
  • Methods for deploying defenses to protect against attacks on top vulnerabilities
  • Ways to actively manage critical trust boundaries on your systems to ensure secure execution and risk minimization


Author: Steve Wilson
Publisher: O'Reilly Media
Published: 10/15/2024
Pages: 190
Binding Type: Paperback
ISBN: 9781098162207

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products