
Red Teaming AI (eBook, ePUB)
A Field Manual for Attacking Intelligent Systems
Versandkostenfrei!
Erscheint vor. 28.07.26
30,95 €
inkl. MwSt.
Unser Service für Vorbesteller - dein Vorteil ohne Risiko:
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir dir den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
Weitere Ausgaben:
PAYBACK Punkte
15 °P sammeln!
AI is no longer a futuristic concept-it's embedded in critical systems shaping finance, healthcare, infrastructure, and national security. But with this power comes unprecedented risk. Red Teaming AI arms you with the mindset, methodology, and tools to proactively test and secure intelligent systems before real adversaries exploit them. Written for security professionals, researchers, and AI practitioners, this field manual goes beyond theory. You'll learn how to map the new AI attack surface, anticipate adversarial moves, and simulate real-world threats to uncover hidden vulnerabilities. You'...
AI is no longer a futuristic concept-it's embedded in critical systems shaping finance, healthcare, infrastructure, and national security. But with this power comes unprecedented risk. Red Teaming AI arms you with the mindset, methodology, and tools to proactively test and secure intelligent systems before real adversaries exploit them. Written for security professionals, researchers, and AI practitioners, this field manual goes beyond theory. You'll learn how to map the new AI attack surface, anticipate adversarial moves, and simulate real-world threats to uncover hidden vulnerabilities. You'll Learn How To:
- Think in graphs, not checklists: trace attack paths through interconnected AI components, data pipelines, and human interactions
- Poison the well: explore how adversaries corrupt training data to implant backdoors and erode model integrity
- Fool the oracle: craft evasion attacks that manipulate AI perception at decision time
- Hijack conversations: execute prompt injection attacks that turn Large Language Models into insider threats
- Steal the brain: probe for model extraction and privacy attacks that compromise valuable IP
- Conduct full-spectrum campaigns: use the STRATEGEMS framework and the AI Kill Graph to plan, execute, and report professional-grade red team engagements
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.