Adversarial AI Attacks, Mitigations, and Defense Strategies : (Record no. 35002)
[ view plain ]
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
---|---|
ISBN | 9781835087985 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 006.3 |
Author Mark | SOT-A |
100 ## - MAIN ENTRY--AUTHOR | |
Author Name | Sotiropoulos, John |
245 ## - TITLE STATEMENT | |
Title | Adversarial AI Attacks, Mitigations, and Defense Strategies : |
Sub-Title | A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of Publication | Birmigham: |
Name of publisher, distributor, etc. | Packt Publishing, |
Date of publication, distribution, etc. | 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Pages | 586p |
Dimensions | 20cm x 27cm |
500 ## - GENERAL NOTE | |
General note | Includes index. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Subject / Department | This strategy-based book is a comprehensive guide to AI security, combining structured frameworks with practical examples to help you identify and counter adversarial attacks. Part 1 introduces the foundations of AI and adversarial attacks. Parts 2, 3, and 4 cover key attack types, showing how each is performed and how to defend against them. Part 5 presents secure-by-design AI strategies, including threat modeling, MLSecOps, and guidance aligned with OWASP and NIST. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Withdrawn status | Not for loan | Collection code | Permanent Location | Current Location | Date acquired | Source of acquisition | Full Call Number | Accession No./Barcode | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|
Computer Science | Air University Multan Campus Library | Air University Multan Campus Library | 05/27/2025 | Ali book service | 006.3 SOT-A | P004994 | 05/27/2025 | Book |