Profil
Mes achats
Découvrez plus de 300 000 ebooks aux formats pdf epub, audio en telechargement ou en lecture streaming. Nous vous avons sélectionné nos coups de cœur toutes categories confondues et mettons en avant l'actualité de la litterature française et internationale.
voir toutes les nouveautés
Nouveautés de la semaine
Recherche avancée
This book explores the most common generative AI (GenAI) tools and techniques used by malicious actors for hacking and cyber-deception, along with the security risks of large language models (LLMs). It also covers how LLM deployment and use can be secured, and how generative AI can be utilized in SOC automation.The rapid advancements and growing variety of publicly available generative AI tools enables cybersecurity use cases for threat modeling, security awareness support, web application scanning, actionable insights, and alert fatigue prevention. However, they also came with a steep rise in the number of offensive/rogue/malicious generative AI applications. With large language models, social engineering tactics can reach new heights in the efficiency of phishing campaigns and cyber-deception via synthetic media generation (misleading deepfake images and videos, faceswapping, morphs, and voice clones). The result is a new era of cybersecurity that necessitates innovative approaches to detect and mitigate sophisticated cyberattacks, and to prevent hyper-realistic cyber-deception.This work provides a starting point for researchers and students diving into malicious chatbot use, system administrators trying to harden the security of GenAI deployments, and organizations prone to sensitive data leak through shadow AI. It also benefits SOC analysts considering generative AI for partially automating incident detection and response, and GenAI vendors working on security guardrails against malicious prompting.
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Ce livre est protégé contre la rediffusion à la demande de l'éditeur (DRM).
La solution LCP apporte un accès simplifié au livre : une clé d'activation associée à votre compte client permet d'ouvrir immédiatement votre livre numérique.
Les livres numériques distribués avec la solution LCP peuvent être lus sur :
La solution Adobe consiste à associer un fichier à un identifiant personnel (Adobe ID). Une fois votre appareil de lecture activé avec cet identifiant, vous pouvez ouvrir le livre avec une application compatible.
Les livres numériques distribués avec la solution Adobe peuvent être lus sur :
mobile-and-tablet Pour vérifier la compatibilité avec vos appareils,consultez la page d'aide
Leslie F. Sikos, Ph.D., is a computer scientist specializing in cybersecurity applications powered by artificial intelligence and data science. He holds two Ph.D. degrees and 20+ industry certificates, coupled with industry experience in enterprise ICT infrastructures. He is an active member of the research community as an author, editor, reviewer, conference organizer, and speaker; a senior member of the IEEE, and a certified professional of the Australian Computer Society. He is an invited reviewer of major academic publishers such as Springer and Taylor & Francis, as well as EU research proposals, and interviewed as a subject matter expert by the United Nations and media outlets such as ABC News and 7NEWS. Dr. Sikos is a prolific author who published, beyond numerous journal papers and conference papers, more than 20 books, including textbooks, monographs, and edited volumes.
Restez informé(e) des événements et promotions ebook
Paiements sécurisés