Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
,

Beyond the Algorithm

AI, Security, Privacy, and Ethics

Paperback Engels 2024 1e druk 9780138268459
Verwachte levertijd ongeveer 8 werkdagen

Samenvatting

As artificial intelligence (AI) becomes more and more woven into our everyday lives—and underpins so much of the infrastructure we rely on—the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.

Bringing together legal studies, philosophy, cybersecurity, and academic literature, Beyond the Algorithm examines these complex issues with a comprehensive, easy-to-understand analysis and overview. The book explores the ethical challenges that professionals-and, increasingly, users-are encountering as AI becomes not just a promise of the future, but a powerful tool of the present.

· An overview of the history and development of AI, from the earliest pioneers in machine learning to current applications and how it might shape the future
· Introduction to AI models and implementations, as well as examples of emerging AI trends
· Examination of vulnerabilities, including insight into potential real-world threats, and best practices for ensuring a safe AI deployment
· Discussion of how to balance accountability, privacy, and ethics with regulatory and legislative concerns with advancing AI technology
· A critical perspective on regulatory obligations, and repercussions, of AI with copyright protection, patent rights, and other intellectual property dilemmas
· An academic resource and guide for the evolving technical and intellectual challenges of AI
· Leading figures in the field bring to life the ethical issues associated with AI through in-depth analysis and case studies in this comprehensive examination.

Specificaties

ISBN13:9780138268459
Taal:Engels
Bindwijze:paperback
Aantal pagina's:336
Druk:1
Verschijningsdatum:7-3-2024
Hoofdrubriek:IT-management / ICT
ISSN:

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Over Omar Santos

Omar Santosis an active member of the cyber security community, where he leads several industry-wide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of their critical infrastructures. Omar is the author of more than a dozen books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar’s current projects can be found at omarsantos.io, and you can follow Omar on Twitter: @santosomar.

Andere boeken door Omar Santos

Inhoudsopgave

Preface. Xvii

1 Historical Overview of Artificial Intelligence (AI) and Machine Learning (ML)1
The Story of Eva 2
The Origins 3
Advancements of Artificial Intelligence 5
Understanding AI and ML 8
Concluding the Story of Eva 25
Summary 26
Test Your Skills 27
Exercise 1-1: Exploring the Historical Development and Ethical Concerns of AI 29
Exercise 1-2: Understanding AI and ML 29
Exercise 1-3: Comparison of ML Algorithms 30
Exercise 1-4: Assessing Applications of ML Algorithms 31

2 Fundamentals of AI and ML Technologies and Implementations 33
What Are the Leading AI and ML Technologies and Algorithms? 34
ChatGPT and the Leading AI and ML Technologies: Exploring
Capabilities and Applications 43
Understanding the Two Categories of AI: Capability-Based Types and Functionality-Based Types 52
Leveraging AI and ML to Tackle Real-World Challenges: A Case Study 53
Reflecting on the Societal and Ethical Implications of AI Technologies 54
Assessing Future Trends and Emerging Developments in AI and ML Technologies 56
Summary 57
Test Your Skills 59
Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with Appropriate Machine Learning Techniques 61
Exercise 2-2: Exploring AI and ML Technologies 63
Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware 63
Exercise 2-4: Understanding the Two Categories of AI 64
Exercise 2-5: Future Trends and Emerging Developments in AI and ML Technologies 64

3 Generative AI and Large Language Models 65
Introduction to Generative AI and LLMs 66
Large Language Models (LLMs): Revolutionizing Natural Language Processing (NLP) 88
Hugging Face 95
Auto-GPT: A Revolutionary Step in Autonomous AI Applications 97
Summary 98
Test Your Skills 99
Exercise 3-1: Hugging Face 102
Exercise 3-2: Transformers in AI 102
Additional Resources 104

4 The Cornerstones of AI and ML Security 105
Recognizing the Need for AI Security 105
Adversarial Attacks 107
Data Poisoning Attacks 109
OWASP Top Ten for LLMs 112
Countermeasures Against Model Stealing Attacks 124
Membership Inference Attacks 124
Evasion Attacks 130
Model Inversion Attacks 135
Backdoor Attacks 137
Exploring Defensive Measures 137
Summary 138
Test Your Skills 140
Additional Resources 142

5 Hacking AI Systems 143
Hacking FakeMedAI 143
MITRE ATLAS 146
A Deep Dive into the AI and ML Attack Tactics and Techniques 147
Exploiting Prompt Injection 161
Red-Teaming AI Models 162
Summary 162
Test Your Skills 163
Exercise 5-1: Understanding the MITRE ATT&CK Framework 166
Exercise 5-2: Exploring the MITRE ATLAS Framework 166

6 System and Infrastructure Security 167
The Vulnerabilities and Risks Associated with AI Systems and Their Potential Impact 167
AI BOMs 176
Data Security Vulnerabilities 177
Cloud Security Vulnerabilities 179
Secure Design Principles for AI Systems 182
AI Model Security 183
Infrastructure Security for AI Systems 184
Threat Detection and Incident Response for AI Systems 190
Additional Security Technologies and Considerations for AI Systems 193
Summary 195
Test Your Skills 196
Additional Resources 197

7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused World 199
Why Do We Need to Balance the Benefits of AI with the Ethical Risks and Privacy Concerns? 200
What Are the Challenges Posed by AI in Terms of Privacy Protection, and What Is the Importance of Privacy and Ethics in AI Development and Deployment? 201
The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications 203
Data Collection and Data Storage in AI Algorithms: Potential Risks and Ethical Privacy Concerns 206
The Moral Tapestry of AI and ChatGPT 212
Preserving Privacy, Unleashing Knowledge: Differential Privacy and Federated Learning in the Age of Data Security 223
Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in AI Systems 224
Real-World Case Study Examples and Fictional Stories of Privacy Breaches in AI and ChatGPT 226
Summary 232
Test Your Skills 234
Exercise 7-1: Privacy Concerns and Ethical Implications of AI 237
Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI Algorithms 238
Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI 238
Exercise 7-4: Safeguarding Privacy and Ethical Frontiers 239

8 Legal and Regulatory Compliance for AI Systems 241
Legal and Regulatory Landscape 242
Compliance with AI Legal and Regulatory Data Protection Laws 245
Intellectual Property Issues in Conversational AI 247
Unraveling Liability and Accountability in the Age of AI 249
Ethical Development and Deployment of AI Systems: Strategies for Effective Governance and Risk Management 252
International Collaboration and Standards in AI 255
Future Trends and Outlook in AI Compliance 257
Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum Computing, and Novel Cyberattacks in Oxford, 2050 260
Summary 261

Test Your Skills 263
Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws 266
Exercise 8-2: Understanding Liability and Accountability in AI Systems 266
Exercise 8-3: International Collaboration and Standards in AI 267
Test Your Skills Answers and Solutions 269

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Beyond the Algorithm