
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title: Large Language Models in Cybersecurity: Threats, Exposure and Mitigation
- Author(s) Andrei Kucharavy, Octave Plancherel, Valentin Mulder, Alain Mermoud, Vincent Lenders
- Publisher: Springer; 2024th edition; eBook (Creative Commons Licensed)
- License(s): Creative Commons License (CC)
- Paperback: 270 pages
- eBook: PDF
- Language: English
- ISBN-10: 3031548264
- ISBN-13: 978-3031548260
- Share This:
![]() |
This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the increased availability of powerful Large Language Models (LLM) and how they can be mitigated.
About the Authors- Andrei Kucharavy is the co-director of the Generative Learning Center at HES-SO Valais-Wallis.
- Computer, Networks, and Information Security
- Deep Learning
- Natural Language Processing (NLP)
- Computational Linguistics

- Large Language Models in Cybersecurity: Threats, Exposure and Mitigation (Andrei Kucharavy, et al.)
- The Mirror Site (1) - PDF
-
Foundations of Large Language Models (Tong Xiao, et al.)
This is a book about Large Language Models (LLM). It primarily focuses on foundational concepts rather than comprehensive coverage of all cutting-edge technologies: pre-training, generative models, prompting techniques, and alignment methods.
-
Rational Cybersecurity for Business (Daniel Blum)
This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.
-
Security of Ubiquitous Computing Systems (Gildas Avoine, et al)
It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.
-
Cybersecurity: Public Sector Threats and Responses
Focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends and strategies from around the world and offers practical guidance for addressing contemporary risks.
-
Demystifying Intelligent Multimode Security Systems
Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution.
-
The Coupling of Safety and Security: Theory and Practice
Explore the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. Define the concepts of safety and security. Discuss methodological, organizational respectively.
-
Foundation Models for Natural Language Processing
This open access book provides a comprehensive overview of the state of the art in research and applications of Foundation Models and is intended for readers familiar with basic Natural Language Processing (NLP) concepts.
-
Representation Learning for Natural Language Processing
This book provides an overview of the recent advances in representation learning theory, algorithms, and applications for natural language processing (NLP), ranging from word embeddings to pre-trained language models.
:
|
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |