ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES a cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps
Description
More Details
Notes
Also in this Series
Reviews from GoodReads
Citations
Sotiropoulos, J. (2024). ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: a cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps (1st edition.). Packt Publishing Ltd..
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Sotiropoulos, John. 2024. ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: A Cybersecurity Professional's Guide to AI Attacks, Threat Modeling, and Securing AI With MLSecOps. Birmingham, UK: Packt Publishing Ltd.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Sotiropoulos, John. ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: A Cybersecurity Professional's Guide to AI Attacks, Threat Modeling, and Securing AI With MLSecOps Birmingham, UK: Packt Publishing Ltd, 2024.
Harvard Citation (style guide)Sotiropoulos, J. (2024). ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: a cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with mlsecops. 1st edn. Birmingham, UK: Packt Publishing Ltd.
MLA Citation, 9th Edition (style guide)Sotiropoulos, John. ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES: A Cybersecurity Professional's Guide to AI Attacks, Threat Modeling, and Securing AI With MLSecOps 1st edition., Packt Publishing Ltd., 2024.
Staff View
Grouping Information
Grouped Work ID | fb76cbb0-fdd7-76f0-7f86-12c81419568e-eng |
---|---|
Full title | adversarial ai attacks mitigations and defense strategies a cybersecurity professionals guide to ai attacks threat modeling and securing ai with mlsecops |
Author | sotiropoulos john |
Grouping Category | book |
Last Update | 2025-02-11 03:40:45AM |
Last Indexed | 2025-05-03 03:41:10AM |
Book Cover Information
Image Source | google_isbn |
---|---|
First Loaded | Dec 30, 2024 |
Last Used | Feb 26, 2025 |
Marc Record
First Detected | Dec 16, 2024 11:30:23 PM |
---|---|
Last File Modification Time | Feb 11, 2025 03:43:05 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 07667cam a22004937a 4500 | ||
---|---|---|---|
001 | on1446416572 | ||
003 | OCoLC | ||
005 | 20250211033926.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 240718s2024 enk o 000 0 eng d | ||
019 | |a 1446802072 | ||
020 | |a 9781835088678|q (electronic bk.) | ||
020 | |a 1835088678|q (electronic bk.) | ||
035 | |a (OCoLC)1446416572|z (OCoLC)1446802072 | ||
037 | |a 9781835087985|b O'Reilly Media | ||
037 | |a 10769346|b IEEE | ||
040 | |a YDX|b eng|c YDX|d OCLCO|d ORMDA|d OCLCO|d EBLCP|d OCLCQ|d IEEEE | ||
049 | |a MAIN | ||
050 | 4 | |a Q335 | |
082 | 0 | 4 | |a 006.3|2 23/eng/20240805 |
100 | 1 | |a Sotiropoulos, John,|e author. | |
245 | 1 | 0 | |a ADVERSARIAL AI ATTACKS, MITIGATIONS, AND DEFENSE STRATEGIES|h [electronic resource] :|b a cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps /|c John Sotiropoulos. |
250 | |a 1st edition. | ||
260 | |a Birmingham, UK :|b Packt Publishing Ltd.,|c 2024. | ||
300 | |a 1 online resource | ||
505 | 0 | |a Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Adversarial AI -- Chapter 1: Getting Started with AI -- Understanding AI and ML -- Types of ML and the ML life cycle -- Key algorithms in ML -- Neural networks and deep learning -- ML development tools -- Summary -- Further reading -- Chapter 2: Building Our Adversarial Playground -- Technical requirements -- Setting up your development environment -- Python installation -- Creating your virtual environment -- Installing packages | |
505 | 8 | |a Registering your virtual environment with Jupyter notebooks -- Verifying your installation -- Hands-on basic baseline ML -- Simple NNs -- Developing our target AI service with CNNs -- Setup and data collection -- Data exploration -- Data preprocessing -- Algorithm selection and building the model -- Model training -- Model evaluation -- Model deployment -- Inference service -- ML development at scale -- Google Colab -- AWS SageMaker -- Azure Machine Learning services -- Lambda Labs Cloud -- Summary -- Chapter 3: Security and Adversarial AI -- Technical requirements -- Security fundamentals | |
505 | 8 | |a Threat modeling -- Risks and mitigations -- DevSecOps -- Securing our adversarial playground -- Host security -- Network protection -- Authentication -- Data protection -- Access control -- Securing code and artifacts -- Secure code -- Securing dependencies with vulnerability scanning -- Secret scanning -- Securing Jupyter Notebooks -- Securing models from malicious code -- Integrating with DevSecOps and MLOps pipelines -- Bypassing security with adversarial AI -- Our first adversarial AI attack -- Traditional cybersecurity and adversarial AI -- Adversarial AI landscape -- Summary | |
505 | 8 | |a Part 2: Model Development Attacks -- Chapter 4: Poisoning Attacks -- Basics of poisoning attacks -- Definition and examples -- Types of poisoning attacks -- Poisoning attack examples -- Why it matters -- Staging a simple poisoning attack -- Creating poisoned samples -- Backdoor poisoning attacks -- Creating backdoor triggers with ART -- Poisoning data with ART -- Hidden-trigger backdoor attacks -- Clean-label attacks -- Advanced poisoning attacks -- Mitigations and defenses -- Cybercity defenses with MLOps -- Anomaly detection -- Robustness tests against poisoning | |
505 | 8 | |a Advanced poisoning defenses with ART -- Adversarial training -- Creating a defense strategy -- Summary -- Chapter 5: Model Tampering with Trojan Horses and Model Reprogramming -- Injecting backdoors using pickle serialization -- Attack scenario -- Defenses and mitigations -- Injecting Trojan horses with Keras Lambda layers -- Attack scenario -- Defenses and mitigations -- Trojan horses with custom layers -- Attack scenario -- Defenses and mitigations -- Neural payload injection -- Attack scenario -- Defenses and mitigations -- Attacking edge AI -- Attack scenario -- Defenses and mitigations | |
520 | |a Understand how adversarial attacks work against predictive and generative AI, and learn how to safeguard AI and LLM projects with practical examples leveraging OWASP, MITRE, and NIST Key Features Understand the connection between AI and security by learning about adversarial AI attacks Discover the latest security challenges in adversarial AI by examining GenAI, deepfakes, and LLMs Implement secure-by-design methods and threat modeling, using standards and MLSecOps to safeguard AI systems Purchase of the print or Kindle book includes a free PDF eBook Book Description Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips cybersecurity professionals with the skills to secure AI technologies, moving beyond research hype or business-as-usual strategies. The strategy-based book is a comprehensive guide to AI security, presenting a structured approach with practical examples to identify and counter adversarial attacks. This book goes beyond a random selection of threats and consolidates recent research and industry standards, incorporating taxonomies from MITRE, NIST, and OWASP. Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. To gain deeper insights, you'll cover examples of incorporating CI, MLOps, and security controls, including open-access LLMs and ML SBOMs. Based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI. By the end of this book, you'll be able to develop, deploy, and secure AI systems effectively. What you will learn Understand poisoning, evasion, and privacy attacks and how to mitigate them Discover how GANs can be used for attacks and deepfakes Explore how LLMs change security, prompt injections, and data exposure Master techniques to poison LLMs with RAG, embeddings, and fine-tuning Explore supply-chain threats and the challenges of open-access LLMs Implement MLSecOps with CIs, MLOps, and SBOMs Who this book is for This book tackles AI security from both angles - offense and defense. AI builders (developers and engineers) will learn how to create secure systems, while cybersecurity professionals, such as security architects, analysts, engineers, ethical hackers, penetration testers, and incident responders will discover methods to combat threats and mitigate risks posed by attackers. The book also provides a secure-by-design approach for leaders to build AI with security in mind. To get the most out of this book, you'll need a basic understanding of security, ML concepts, and Python. | ||
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Artificial intelligence|9 29344 | |
650 | 0 | |a Information storage and retrieval systems|x Risk management. | |
650 | 0 | |a Information technology|x Management.|9 78814 | |
650 | 0 | |a Data privacy. | |
650 | 0 | |a Data protection.|9 35538 | |
776 | 0 | 8 | |i Print version:|z 1835087981|z 9781835087985|w (OCoLC)1439035560 |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781835087985/?ar|x O'Reilly|z eBook |
938 | |a YBP Library Services|b YANK|n 306543637 | ||
938 | |a ProQuest Ebook Central|b EBLB|n EBL31529206 | ||
994 | |a 92|b VIA | ||
999 | |c 361136|d 361136 |