AI Cybersecurity Handbook
AI Cybersecurity Handbook
Wong, Caroline
John Wiley & Sons Inc
03/2026
272
Mole
Inglês
9781394340866
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
Preface xi
Acknowledgments xiii
Introduction xv
PART I: CYBER'S NEW PLAYER: AI ON BOTH TEAMS 1
Chapter 1: The Age of Adaptive Adversaries: AI's Impact on the Security Balance of Power 3
Chapter 2: Smarter, Faster, Cheaper Recon: What Hackers Know Before You Even Notice 15
Chapter 3: Polymorphic to Predictive: How AI Supercharges Malware at Machine Speed 31
Chapter 4: Breaking the Rules: Novel Attacks and the Limits of Signature Detection 53
Chapter 5: Hyper-real, Hyper-targeted: Deepfakes, Phishing, and AI-powered Deception 79
PART II: BUILDING RESILIENCE WITH AI 97
Chapter 6: Patterns of Life: Learning What's Normal and Spotting What's Not 99
Chapter 7: From Alert to Containment-AI-augmented Incident Response 127
Chapter 8: The Illusion of Trust: Poisoned Data, Tampered Models, and AI Supply Chain Risk 153
Chapter 9: Building Secure Model Supply Chains with AI-augmented Security Teams 181
PART III: STAYING GROUNDED: TRUST, RISK, AND ACCOUNTABILITY 205
Chapter 10: Human Values, Machine Decisions: The Ethics of AI in Security 207
Chapter 11: The Human Advantage: Leadership, Learning, and the Future of AI Security 225
Index 239
Acknowledgments xiii
Introduction xv
PART I: CYBER'S NEW PLAYER: AI ON BOTH TEAMS 1
Chapter 1: The Age of Adaptive Adversaries: AI's Impact on the Security Balance of Power 3
Chapter 2: Smarter, Faster, Cheaper Recon: What Hackers Know Before You Even Notice 15
Chapter 3: Polymorphic to Predictive: How AI Supercharges Malware at Machine Speed 31
Chapter 4: Breaking the Rules: Novel Attacks and the Limits of Signature Detection 53
Chapter 5: Hyper-real, Hyper-targeted: Deepfakes, Phishing, and AI-powered Deception 79
PART II: BUILDING RESILIENCE WITH AI 97
Chapter 6: Patterns of Life: Learning What's Normal and Spotting What's Not 99
Chapter 7: From Alert to Containment-AI-augmented Incident Response 127
Chapter 8: The Illusion of Trust: Poisoned Data, Tampered Models, and AI Supply Chain Risk 153
Chapter 9: Building Secure Model Supply Chains with AI-augmented Security Teams 181
PART III: STAYING GROUNDED: TRUST, RISK, AND ACCOUNTABILITY 205
Chapter 10: Human Values, Machine Decisions: The Ethics of AI in Security 207
Chapter 11: The Human Advantage: Leadership, Learning, and the Future of AI Security 225
Index 239
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Red team cybersecurity; blue team cybersecurity; artificial intelligence cybersecurity; ai cybersecurity tools; ai cybersecurity defenses; ai cybersecurity strategies; ai cybersecurity techniques; ai cybersecurity ethics; ai cybersecurity book
Preface xi
Acknowledgments xiii
Introduction xv
PART I: CYBER'S NEW PLAYER: AI ON BOTH TEAMS 1
Chapter 1: The Age of Adaptive Adversaries: AI's Impact on the Security Balance of Power 3
Chapter 2: Smarter, Faster, Cheaper Recon: What Hackers Know Before You Even Notice 15
Chapter 3: Polymorphic to Predictive: How AI Supercharges Malware at Machine Speed 31
Chapter 4: Breaking the Rules: Novel Attacks and the Limits of Signature Detection 53
Chapter 5: Hyper-real, Hyper-targeted: Deepfakes, Phishing, and AI-powered Deception 79
PART II: BUILDING RESILIENCE WITH AI 97
Chapter 6: Patterns of Life: Learning What's Normal and Spotting What's Not 99
Chapter 7: From Alert to Containment-AI-augmented Incident Response 127
Chapter 8: The Illusion of Trust: Poisoned Data, Tampered Models, and AI Supply Chain Risk 153
Chapter 9: Building Secure Model Supply Chains with AI-augmented Security Teams 181
PART III: STAYING GROUNDED: TRUST, RISK, AND ACCOUNTABILITY 205
Chapter 10: Human Values, Machine Decisions: The Ethics of AI in Security 207
Chapter 11: The Human Advantage: Leadership, Learning, and the Future of AI Security 225
Index 239
Acknowledgments xiii
Introduction xv
PART I: CYBER'S NEW PLAYER: AI ON BOTH TEAMS 1
Chapter 1: The Age of Adaptive Adversaries: AI's Impact on the Security Balance of Power 3
Chapter 2: Smarter, Faster, Cheaper Recon: What Hackers Know Before You Even Notice 15
Chapter 3: Polymorphic to Predictive: How AI Supercharges Malware at Machine Speed 31
Chapter 4: Breaking the Rules: Novel Attacks and the Limits of Signature Detection 53
Chapter 5: Hyper-real, Hyper-targeted: Deepfakes, Phishing, and AI-powered Deception 79
PART II: BUILDING RESILIENCE WITH AI 97
Chapter 6: Patterns of Life: Learning What's Normal and Spotting What's Not 99
Chapter 7: From Alert to Containment-AI-augmented Incident Response 127
Chapter 8: The Illusion of Trust: Poisoned Data, Tampered Models, and AI Supply Chain Risk 153
Chapter 9: Building Secure Model Supply Chains with AI-augmented Security Teams 181
PART III: STAYING GROUNDED: TRUST, RISK, AND ACCOUNTABILITY 205
Chapter 10: Human Values, Machine Decisions: The Ethics of AI in Security 207
Chapter 11: The Human Advantage: Leadership, Learning, and the Future of AI Security 225
Index 239
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.