دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Santos, Omar, Radanliev, Petar سری: ISBN (شابک) : 9780138268459, 0138268452 ناشر: Addison-Wesley سال نشر: 2024 تعداد صفحات: 337 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 2 Mb
در صورت تبدیل فایل کتاب Beyond the Algorithm: AI, Security, Privacy, and Ethics به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب فراتر از الگوریتم: هوش مصنوعی، امنیت، حریم خصوصی و اخلاق نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover Half Title Title Page Copyright Page Contents Preface 1 Historical Overview of Artificial Intelligence (AI) and Machine Learning (ML) The Story of Eva The Origins Advancements of Artificial Intelligence Understanding AI and ML Comparison of ML Algorithms Problems to Consider When Choosing a Suitable Algorithm Applications of ML Algorithms Use Cases for AI and ML Algorithms AI and ML Solutions for Creating Wealth and Resolving Global Problems Ethical Challenges in AI and ML Privacy and Security Challenges in AI and ML AI and ML in Cybersecurity Cyber Risk from AI and ML Concluding the Story of Eva Summary Test Your Skills Exercise 1-1: Exploring the Historical Development and Ethical Concerns of AI Exercise 1-2: Understanding AI and ML Exercise 1-3: Comparison of ML Algorithms Exercise 1-4: Assessing Applications of ML Algorithms 2 Fundamentals of AI and ML Technologies and Implementations What Are the Leading AI and ML Technologies and Algorithms? Supervised Learning Unsupervised Learning Deep Learning Reinforcement Learning ChatGPT and the Leading AI and ML Technologies: Exploring Capabilities and Applications Natural Language Generation (NLG) Speech Recognition Virtual Agents Decision Management Biometrics Machine Learning and Peer-to-Peer Networks Convergence Deep Learning Platforms Introduction to Robotic Process Automation (RPA) and GPT: Exploring Their Capabilities and Applications Hardware Designed for Artificial Intelligence Capabilities and Benefits of AI-Optimized Hardware in Enhancing AI Performance and Efficiency Case Study Highlighting the Functionalities and Practical Applications of the Ten AI and ML Technologies: Transforming Business with AI and ML Understanding the Two Categories of AI: Capability-Based Types and Functionality-Based Types Leveraging AI and ML to Tackle Real-World Challenges: A Case Study Reflecting on the Societal and Ethical Implications of AI Technologies Assessing Future Trends and Emerging Developments in AI and ML Technologies Summary Test Your Skills Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with Appropriate Machine Learning Techniques Exercise 2-2: Exploring AI and ML Technologies Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware Exercise 2-4: Understanding the Two Categories of AI Exercise 2-5: Future Trends and Emerging Developments in AI and ML Technologies 3 Generative AI and Large Language Models Introduction to Generative AI and LLMs A Personal Story from Omar Understanding Generative AI Generative Adversarial Networks (GANs) Challenges in Training GANs Tools and Libraries to Work with GANs Variational Autoencoders (VAEs) Autoregressive Models Restricted Boltzmann Machines (RBMs) Normalizing Flows Large Language Models (LLMs): Revolutionizing Natural Language Processing (NLP) The Transformer Architecture OpenAI’s GPT-4 and Beyond: A Breakthrough in Large Language Models Prompt Engineering Hugging Face Contributions to the NLP Landscape Auto-GPT: A Revolutionary Step in Autonomous AI Applications Understanding Auto-GPT Responsibilities and Limitations Summary Test Your Skills Exercise 3-1: Hugging Face Exercise 3-2: Transformers in AI Additional Resources 4 The Cornerstones of AI and ML Security Recognizing the Need for AI Security Adversarial Attacks Exploring Real-World Examples of Adversarial Attacks Understanding the Implications of Adversarial Attacks Data Poisoning Attacks Methods of Data Poisoning Attacks Real-World Examples of Data Poisoning Attacks OWASP Top Ten for LLMs Prompt Injection Attacks Insecure Output Handling Training Data Poisoning Model Denial of Service (DoS) Supply Chain Vulnerabilities Sensitive Information Disclosure Insecure Plugin Design Excessive Agency Overreliance Model Theft Countermeasures Against Model Stealing Attacks Membership Inference Attacks Real-World Examples of Membership Inference Attacks Evasion Attacks Model Inversion Attacks Real-World Example of Model Inversion Attacks Mitigating Model Inversion Attacks Backdoor Attacks Exploring Defensive Measures Summary Test Your Skills Additional Resources 5 Hacking AI Systems Hacking FakeMedAI MITRE ATLAS What Are Tactics and Techniques in ATLAS? What Is the ATLAS Navigator? A Deep Dive into the AI and ML Attack Tactics and Techniques Reconnaissance Resource Development Initial Access AI and ML Model Access Execution Persistence Defense Evasion Discovery Collection AI and ML Attack Staging Exfiltration Impact Exploiting Prompt Injection Red-Teaming AI Models Summary Test Your Skills Exercise 5-1: Understanding the MITRE ATT&CK Framework Exercise 5-2: Exploring the MITRE ATLAS Framework 6 System and Infrastructure Security The Vulnerabilities and Risks Associated with AI Systems and Their Potential Impact Network Security Vulnerabilities Physical Security Vulnerabilities System Security Vulnerabilities Software Bill of Materials (SBOM) and Patch Management Vulnerability Exploitability eXchange (VEX) AI BOMs The Critical Role of AI BOMs Key Elements of an AI BOM Data Security Vulnerabilities Cloud Security Vulnerabilities Misconfigured Access Controls Weak Authentication Processes Insecure APIs Data Exposure and Leakage Insecure Integrations Supply Chain Attacks Account Hijacking Cloud Metadata Exploitation Secure Design Principles for AI Systems Principles for Secure AI Model Development and Deployment Best Practices for Secure AI Infrastructure Design AI Model Security Techniques for Securing AI Models from Attacks Secure Model Training and Evaluation Practices Infrastructure Security for AI Systems Securing AI Data Storage and Processing Systems Data Anonymization Techniques Regular Audits and Network Security Measures for Protecting AI Infrastructure Threat Detection and Incident Response for AI Systems Incident Response Strategies for AI Systems Forensic Investigations in AI System Compromises Additional Security Technologies and Considerations for AI Systems Summary Test Your Skills Additional Resources 7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused World Why Do We Need to Balance the Benefits of AI with the Ethical Risks and Privacy Concerns? What Are the Challenges Posed by AI in Terms of Privacy Protection, and What Is the Importance of Privacy and Ethics in AI Development and Deployment? The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications Data Collection and Data Storage in AI Algorithms: Potential Risks and Ethical Privacy Concerns The Moral Tapestry of AI and ChatGPT Threads of Fairness: Untangling Algorithmic Bias Weaving Destiny: The Impact on Human Decision-Making and Autonomy Navigating the Shadows: Safeguarding Privacy and Ethical Frontiers Preserving Privacy, Unleashing Knowledge: Differential Privacy and Federated Learning in the Age of Data Security Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in AI Systems Real-World Case Study Examples and Fictional Stories of Privacy Breaches in AI and ChatGPT Fictional Case Studies on Privacy Breaches by Future AI and ChatGPT Systems Summary Test Your Skills Exercise 7-1: Privacy Concerns and Ethical Implications of AI Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI Algorithms Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI Exercise 7-4: Safeguarding Privacy and Ethical Frontiers 8 Legal and Regulatory Compliance for AI Systems Legal and Regulatory Landscape Compliance with AI Legal and Regulatory Data Protection Laws Intellectual Property Issues in Conversational AI Patentability of AI Algorithms Copyright Protection for AI-Generated Content Trademark Protection for AI Systems Trade Secret Protection for AI Development Unraveling Liability and Accountability in the Age of AI Ethical Development and Deployment of AI Systems: Strategies for Effective Governance and Risk Management International Collaboration and Standards in AI Future Trends and Outlook in AI Compliance Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum Computing, and Novel Cyberattacks in Oxford, 2050 Summary Test Your Skills Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws Exercise 8-2: Understanding Liability and Accountability in AI Systems Exercise 8-3: International Collaboration and Standards in AI Test Your Skills Answers and Solutions Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z