The developer's playbook for large language model security building secure AI applications
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing ge...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media, Inc.
2025
|
Ausgabe: | First edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100397603 | ||
003 | DE-627-1 | ||
005 | 20241001123256.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240129s2025 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)100397603 | ||
035 | |a (DE-599)KEP100397603 | ||
035 | |a (ORHE)9781098162191 | ||
035 | |a (DE-627-1)100397603 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240123 | |
100 | 1 | |a Wilson, Steve |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The developer's playbook for large language model security |b building secure AI applications |c Steve Wilson |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media, Inc. |c 2025 | |
300 | |a 1 online resource (250 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list--a feat accomplished by more than 400 industry experts--this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI. | ||
650 | 0 | |a Artificial intelligence |x Computer programs |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Natural language generation (Computer science) | |
650 | 4 | |a Intelligence artificielle ; Logiciels ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Génération automatique de texte | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098162191/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-100397603 |
---|---|
_version_ | 1818767372938379264 |
adam_text | |
any_adam_object | |
author | Wilson, Steve |
author_facet | Wilson, Steve |
author_role | aut |
author_sort | Wilson, Steve |
author_variant | s w sw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100397603 (DE-599)KEP100397603 (ORHE)9781098162191 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02382cam a22003972 4500</leader><controlfield tag="001">ZDB-30-ORH-100397603</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123256.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240129s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100397603</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100397603</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098162191</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100397603</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240123</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilson, Steve</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The developer's playbook for large language model security</subfield><subfield code="b">building secure AI applications</subfield><subfield code="c">Steve Wilson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2025</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (250 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list--a feat accomplished by more than 400 industry experts--this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield><subfield code="x">Computer programs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Natural language generation (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle ; Logiciels ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Génération automatique de texte</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098162191/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100397603 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:51Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (250 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2025 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
spelling | Wilson, Steve VerfasserIn aut The developer's playbook for large language model security building secure AI applications Steve Wilson First edition. Sebastopol, CA O'Reilly Media, Inc. 2025 1 online resource (250 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list--a feat accomplished by more than 400 industry experts--this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI. Artificial intelligence Computer programs Security measures Computer networks Security measures Natural language generation (Computer science) Intelligence artificielle ; Logiciels ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Génération automatique de texte TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781098162191/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Wilson, Steve The developer's playbook for large language model security building secure AI applications Artificial intelligence Computer programs Security measures Computer networks Security measures Natural language generation (Computer science) Intelligence artificielle ; Logiciels ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Génération automatique de texte |
title | The developer's playbook for large language model security building secure AI applications |
title_auth | The developer's playbook for large language model security building secure AI applications |
title_exact_search | The developer's playbook for large language model security building secure AI applications |
title_full | The developer's playbook for large language model security building secure AI applications Steve Wilson |
title_fullStr | The developer's playbook for large language model security building secure AI applications Steve Wilson |
title_full_unstemmed | The developer's playbook for large language model security building secure AI applications Steve Wilson |
title_short | The developer's playbook for large language model security |
title_sort | developer s playbook for large language model security building secure ai applications |
title_sub | building secure AI applications |
topic | Artificial intelligence Computer programs Security measures Computer networks Security measures Natural language generation (Computer science) Intelligence artificielle ; Logiciels ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Génération automatique de texte |
topic_facet | Artificial intelligence Computer programs Security measures Computer networks Security measures Natural language generation (Computer science) Intelligence artificielle ; Logiciels ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Génération automatique de texte |
url | https://learning.oreilly.com/library/view/-/9781098162191/?ar |
work_keys_str_mv | AT wilsonsteve thedevelopersplaybookforlargelanguagemodelsecuritybuildingsecureaiapplications AT wilsonsteve developersplaybookforlargelanguagemodelsecuritybuildingsecureaiapplications |