The Developer’s Playbook for Large Language Model Security: Building Secure AI Applications
Author:Steve Wilson (Author)
Publisher finelybook 出版社:O’Reilly Media
Edition 版本:1st edition
Publication Date 出版日期:2024-10-15
Language 语言:English
Print Length 页数:200pages
ISBN-10:109816220X
ISBN-13:9781098162207
Book Description
About the Author
Steve Wilson is a recognized leader in the emerging field of security for Large Language Models (LLMs). In his role as head of the open-source “Top 10 List for LLM Applications” at the Open Web Application Security Project (OWASP) Foundation, Steve built a team of over 400 experts who contributed to the creation of the first industry-standard, comprehensive look at security threats to applications using LLM technology. In his role as Chief Product Officer at Contrast Security, Steve owns all Product Development for a highly recognized company providing code security technology to the world’s largest, most security conscious organizations. Steve has over 25 years of experience building software platforms at multi-billion-dollar technology companies such as Citrix, Oracle and Sun Microsystems.
Steve is the author of “Java Platform Performance: Strategies and Tactics” and “The Father/Daughter Guide to Cryptocurrency Mining” series. He is a popular speaker on future of work and artificial intelligence topics and has recently presented at RSA, The Churchill Club, Silicon Valley Leadership Group, DLA Piper Global Technology Summit, IDG Agenda, SAP TechEd and WSJ Tech D.Live.
下载地址
PDF, EPUB | 7 MB | 2024-09-29
未经允许不得转载:finelybook » The Developer’s Playbook for Large Language Model Security: Building Secure AI Applications
相关推荐
Java Generics and Collections: Fundamentals and Recommended Practices, 2nd Edition
Interview Speak: What your interviewer really wants to know
Green Computing for Sustainable Development
Generative Artificial Intelligence and Language Teaching
Flutter Solutions for Web Development: Modern web development with Flutter, Dart, and AI integration
Data Recovery Techniques for Computer Forensics