ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Beyond the Algorithm: AI, Security, Privacy, and Ethics

دانلود کتاب فراتر از الگوریتم: هوش مصنوعی، امنیت، حریم خصوصی و اخلاق

Beyond the Algorithm: AI, Security, Privacy, and Ethics

مشخصات کتاب

Beyond the Algorithm: AI, Security, Privacy, and Ethics

ویرایش:  
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 9780138268459, 0138268452 
ناشر: Addison-Wesley 
سال نشر: 2024 
تعداد صفحات: 337 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 2 Mb 

قیمت کتاب (تومان) : 46,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Beyond the Algorithm: AI, Security, Privacy, and Ethics به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فراتر از الگوریتم: هوش مصنوعی، امنیت، حریم خصوصی و اخلاق نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Half Title
Title Page
Copyright Page
Contents
Preface
1 Historical Overview of Artificial Intelligence (AI) and Machine Learning (ML)
	The Story of Eva
	The Origins
	Advancements of Artificial Intelligence
	Understanding AI and ML
		Comparison of ML Algorithms
		Problems to Consider When Choosing a Suitable Algorithm
		Applications of ML Algorithms
		Use Cases for AI and ML Algorithms
		AI and ML Solutions for Creating Wealth and Resolving Global Problems
		Ethical Challenges in AI and ML
		Privacy and Security Challenges in AI and ML
		AI and ML in Cybersecurity
		Cyber Risk from AI and ML
	Concluding the Story of Eva
	Summary
	Test Your Skills
	Exercise 1-1: Exploring the Historical Development and Ethical Concerns of AI
	Exercise 1-2: Understanding AI and ML
	Exercise 1-3: Comparison of ML Algorithms
	Exercise 1-4: Assessing Applications of ML Algorithms
2 Fundamentals of AI and ML Technologies and Implementations
	What Are the Leading AI and ML Technologies and Algorithms?
		Supervised Learning
		Unsupervised Learning
		Deep Learning
		Reinforcement Learning
	ChatGPT and the Leading AI and ML Technologies: Exploring Capabilities and Applications
		Natural Language Generation (NLG)
		Speech Recognition
		Virtual Agents
		Decision Management
		Biometrics
		Machine Learning and Peer-to-Peer Networks Convergence
		Deep Learning Platforms
		Introduction to Robotic Process Automation (RPA) and GPT: Exploring Their Capabilities and Applications
		Hardware Designed for Artificial Intelligence
		Capabilities and Benefits of AI-Optimized Hardware in Enhancing AI Performance and Efficiency
		Case Study Highlighting the Functionalities and Practical Applications of the Ten AI and ML Technologies: Transforming Business with AI and ML
	Understanding the Two Categories of AI: Capability-Based Types and Functionality-Based Types
	Leveraging AI and ML to Tackle Real-World Challenges: A Case Study
	Reflecting on the Societal and Ethical Implications of AI Technologies
	Assessing Future Trends and Emerging Developments in AI and ML Technologies
	Summary
	Test Your Skills
	Exercise 2-1: Algorithm Selection Exercise: Matching Scenarios with Appropriate Machine Learning Techniques
	Exercise 2-2: Exploring AI and ML Technologies
	Exercise 2-3: Capabilities and Benefits of AI-Optimized Hardware
	Exercise 2-4: Understanding the Two Categories of AI
	Exercise 2-5: Future Trends and Emerging Developments in AI and ML Technologies
3 Generative AI and Large Language Models
	Introduction to Generative AI and LLMs
		A Personal Story from Omar
		Understanding Generative AI
		Generative Adversarial Networks (GANs)
		Challenges in Training GANs
		Tools and Libraries to Work with GANs
		Variational Autoencoders (VAEs)
		Autoregressive Models
		Restricted Boltzmann Machines (RBMs)
		Normalizing Flows
	Large Language Models (LLMs): Revolutionizing Natural Language Processing (NLP)
		The Transformer Architecture
		OpenAI’s GPT-4 and Beyond: A Breakthrough in Large Language Models
		Prompt Engineering
	Hugging Face
		Contributions to the NLP Landscape
	Auto-GPT: A Revolutionary Step in Autonomous AI Applications
		Understanding Auto-GPT
		Responsibilities and Limitations
	Summary
	Test Your Skills
	Exercise 3-1: Hugging Face
	Exercise 3-2: Transformers in AI
	Additional Resources
4 The Cornerstones of AI and ML Security
	Recognizing the Need for AI Security
	Adversarial Attacks
		Exploring Real-World Examples of Adversarial Attacks
		Understanding the Implications of Adversarial Attacks
	Data Poisoning Attacks
		Methods of Data Poisoning Attacks
		Real-World Examples of Data Poisoning Attacks
	OWASP Top Ten for LLMs
		Prompt Injection Attacks
		Insecure Output Handling
		Training Data Poisoning
		Model Denial of Service (DoS)
		Supply Chain Vulnerabilities
		Sensitive Information Disclosure
		Insecure Plugin Design
		Excessive Agency
		Overreliance
		Model Theft
		Countermeasures Against Model Stealing Attacks
	Membership Inference Attacks
		Real-World Examples of Membership Inference Attacks
	Evasion Attacks
	Model Inversion Attacks
		Real-World Example of Model Inversion Attacks
		Mitigating Model Inversion Attacks
	Backdoor Attacks
	Exploring Defensive Measures
	Summary
	Test Your Skills
	Additional Resources
5 Hacking AI Systems
	Hacking FakeMedAI
	MITRE ATLAS
		What Are Tactics and Techniques in ATLAS?
		What Is the ATLAS Navigator?
	A Deep Dive into the AI and ML Attack Tactics and Techniques
		Reconnaissance
		Resource Development
		Initial Access
		AI and ML Model Access
		Execution
		Persistence
		Defense Evasion
		Discovery
		Collection
		AI and ML Attack Staging
		Exfiltration
		Impact
	Exploiting Prompt Injection
	Red-Teaming AI Models
	Summary
	Test Your Skills
	Exercise 5-1: Understanding the MITRE ATT&CK Framework
	Exercise 5-2: Exploring the MITRE ATLAS Framework
6 System and Infrastructure Security
	The Vulnerabilities and Risks Associated with AI Systems and Their Potential Impact
		Network Security Vulnerabilities
		Physical Security Vulnerabilities
		System Security Vulnerabilities
		Software Bill of Materials (SBOM) and Patch Management
		Vulnerability Exploitability eXchange (VEX)
	AI BOMs
		The Critical Role of AI BOMs
		Key Elements of an AI BOM
	Data Security Vulnerabilities
	Cloud Security Vulnerabilities
		Misconfigured Access Controls
		Weak Authentication Processes
		Insecure APIs
		Data Exposure and Leakage
		Insecure Integrations
		Supply Chain Attacks
		Account Hijacking
		Cloud Metadata Exploitation
	Secure Design Principles for AI Systems
		Principles for Secure AI Model Development and Deployment
		Best Practices for Secure AI Infrastructure Design
	AI Model Security
		Techniques for Securing AI Models from Attacks
		Secure Model Training and Evaluation Practices
	Infrastructure Security for AI Systems
		Securing AI Data Storage and Processing Systems
		Data Anonymization Techniques
		Regular Audits and Network Security Measures for Protecting AI Infrastructure
	Threat Detection and Incident Response for AI Systems
		Incident Response Strategies for AI Systems
		Forensic Investigations in AI System Compromises
	Additional Security Technologies and Considerations for AI Systems
	Summary
	Test Your Skills
	Additional Resources
7 Privacy and Ethics: Navigating Privacy and Ethics in an AI-Infused World
	Why Do We Need to Balance the Benefits of AI with the Ethical Risks and Privacy Concerns?
	What Are the Challenges Posed by AI in Terms of Privacy Protection, and What Is the Importance of Privacy and Ethics in AI Development and Deployment?
	The Dark Side of AI and ChatGPT: Privacy Concerns and Ethical Implications
	Data Collection and Data Storage in AI Algorithms: Potential Risks and Ethical Privacy Concerns
	The Moral Tapestry of AI and ChatGPT
		Threads of Fairness: Untangling Algorithmic Bias
		Weaving Destiny: The Impact on Human Decision-Making and Autonomy
		Navigating the Shadows: Safeguarding Privacy and Ethical Frontiers
	Preserving Privacy, Unleashing Knowledge: Differential Privacy and Federated Learning in the Age of Data Security
	Harmony in the Machine: Nurturing Fairness, Diversity, and Human Control in AI Systems
	Real-World Case Study Examples and Fictional Stories of Privacy Breaches in AI and ChatGPT
		Fictional Case Studies on Privacy Breaches by Future AI and ChatGPT Systems
	Summary
	Test Your Skills
	Exercise 7-1: Privacy Concerns and Ethical Implications of AI
	Exercise 7-2: Ethical Privacy Concerns in Data Collection and Storage by AI Algorithms
	Exercise 7-3: Balancing Autonomy and Privacy in the Age of AI
	Exercise 7-4: Safeguarding Privacy and Ethical Frontiers
8 Legal and Regulatory Compliance for AI Systems
	Legal and Regulatory Landscape
	Compliance with AI Legal and Regulatory Data Protection Laws
	Intellectual Property Issues in Conversational AI
		Patentability of AI Algorithms
		Copyright Protection for AI-Generated Content
		Trademark Protection for AI Systems
		Trade Secret Protection for AI Development
	Unraveling Liability and Accountability in the Age of AI
	Ethical Development and Deployment of AI Systems: Strategies for Effective Governance and Risk Management
	International Collaboration and Standards in AI
	Future Trends and Outlook in AI Compliance
	Unleashing the Quantum Storm: Fictional Story on AI Cybersecurity, Quantum Computing, and Novel Cyberattacks in Oxford, 2050
	Summary
	Test Your Skills
	Exercise 8-1: Compliance with Legal and Regulatory Data Protection Laws
	Exercise 8-2: Understanding Liability and Accountability in AI Systems
	Exercise 8-3: International Collaboration and Standards in AI
Test Your Skills Answers and Solutions
Index
	A
	B
	C
	D
	E
	F
	G
	H
	I
	J
	K
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W
	X
	Y
	Z




نظرات کاربران