The developer's playbook for large language model security building secure AI applications

Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing ge...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Wilson, Steve (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Sebastopol, CA O'Reilly Media, Inc. 2025
Ausgabe:First edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-100397603
003 DE-627-1
005 20241001123256.0
007 cr uuu---uuuuu
008 240129s2025 xx |||||o 00| ||eng c
035 |a (DE-627-1)100397603 
035 |a (DE-599)KEP100397603 
035 |a (ORHE)9781098162191 
035 |a (DE-627-1)100397603 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20240123 
100 1 |a Wilson, Steve  |e VerfasserIn  |4 aut 
245 1 4 |a The developer's playbook for large language model security  |b building secure AI applications  |c Steve Wilson 
250 |a First edition. 
264 1 |a Sebastopol, CA  |b O'Reilly Media, Inc.  |c 2025 
300 |a 1 online resource (250 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references 
520 |a Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list--a feat accomplished by more than 400 industry experts--this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI. 
650 0 |a Artificial intelligence  |x Computer programs  |x Security measures 
650 0 |a Computer networks  |x Security measures 
650 0 |a Natural language generation (Computer science) 
650 4 |a Intelligence artificielle ; Logiciels ; Sécurité ; Mesures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Génération automatique de texte 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781098162191/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-100397603
_version_ 1818767372938379264
adam_text
any_adam_object
author Wilson, Steve
author_facet Wilson, Steve
author_role aut
author_sort Wilson, Steve
author_variant s w sw
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)100397603
(DE-599)KEP100397603
(ORHE)9781098162191
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition First edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02382cam a22003972 4500</leader><controlfield tag="001">ZDB-30-ORH-100397603</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123256.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240129s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100397603</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100397603</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098162191</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100397603</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240123</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilson, Steve</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The developer's playbook for large language model security</subfield><subfield code="b">building secure AI applications</subfield><subfield code="c">Steve Wilson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2025</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (250 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list--a feat accomplished by more than 400 industry experts--this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield><subfield code="x">Computer programs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Natural language generation (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle ; Logiciels ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Génération automatique de texte</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098162191/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-100397603
illustrated Illustrated
indexdate 2024-12-18T08:48:51Z
institution BVB
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (250 pages) illustrations
psigel ZDB-30-ORH
publishDate 2025
publishDateSearch 2024
publishDateSort 2024
publisher O'Reilly Media, Inc.
record_format marc
spelling Wilson, Steve VerfasserIn aut
The developer's playbook for large language model security building secure AI applications Steve Wilson
First edition.
Sebastopol, CA O'Reilly Media, Inc. 2025
1 online resource (250 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models. Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list--a feat accomplished by more than 400 industry experts--this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI.
Artificial intelligence Computer programs Security measures
Computer networks Security measures
Natural language generation (Computer science)
Intelligence artificielle ; Logiciels ; Sécurité ; Mesures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Génération automatique de texte
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781098162191/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Wilson, Steve
The developer's playbook for large language model security building secure AI applications
Artificial intelligence Computer programs Security measures
Computer networks Security measures
Natural language generation (Computer science)
Intelligence artificielle ; Logiciels ; Sécurité ; Mesures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Génération automatique de texte
title The developer's playbook for large language model security building secure AI applications
title_auth The developer's playbook for large language model security building secure AI applications
title_exact_search The developer's playbook for large language model security building secure AI applications
title_full The developer's playbook for large language model security building secure AI applications Steve Wilson
title_fullStr The developer's playbook for large language model security building secure AI applications Steve Wilson
title_full_unstemmed The developer's playbook for large language model security building secure AI applications Steve Wilson
title_short The developer's playbook for large language model security
title_sort developer s playbook for large language model security building secure ai applications
title_sub building secure AI applications
topic Artificial intelligence Computer programs Security measures
Computer networks Security measures
Natural language generation (Computer science)
Intelligence artificielle ; Logiciels ; Sécurité ; Mesures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Génération automatique de texte
topic_facet Artificial intelligence Computer programs Security measures
Computer networks Security measures
Natural language generation (Computer science)
Intelligence artificielle ; Logiciels ; Sécurité ; Mesures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Génération automatique de texte
url https://learning.oreilly.com/library/view/-/9781098162191/?ar
work_keys_str_mv AT wilsonsteve thedevelopersplaybookforlargelanguagemodelsecuritybuildingsecureaiapplications
AT wilsonsteve developersplaybookforlargelanguagemodelsecuritybuildingsecureaiapplications