Other Books You May Enjoy
If you enjoyed this book, you may be interested in these other books by Packt:
Adversarial AI Attacks, Mitigations, and Defense Strategies
John Sotiropoulos
ISBN: 978-1-83508-798-5
- Set up a playground to explore how adversarial attacks work
- Discover how AI models can be poisoned and what you can do to prevent this
- Learn about the use of trojan horses to tamper with and reprogram models
- Understand supply chain risks
- Examine how your models or data can be stolen in privacy attacks
- See how GANs are weaponized for Deepfake creation and cyberattacks
- Explore emerging LLM-specific attacks, such as prompt injection
Cybersecurity Architect's Handbook
Lester Nichols
ISBN: 978-1-80323-584-4
- Get to grips with the foundational concepts and basics of cybersecurity
- Understand cybersecurity architecture principles through scenario...