AI Under Attack
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > AI Under Attack
AI Under Attack

AI Under Attack


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Built on Fortune 500 experience, this guide delivers hands-on methods to secure generative AI with extensive coverage of RAG, agents, prompt injection, data pipelines, Zero Trust, and sustainable programs Key Features Clearly identify and manage real-world risks unique to generative AI, confidently explaining their implications to both technical teams and business stakeholders while understanding the complete AI security ecosystem. Book DescriptionContrary to general AI texts or cybersecurity books with limited AI coverage, this guide offers a comprehensive dive into securing the generative AI ecosystem. It moves through five parts: Foundations explains why AI security is unique, covering threat modeling, attack surfaces, and defense principles. Attacks examines vectors against system anatomy, data/models, prompt injection, memory, RAG, and agents, concluding with red teaming and evaluation. Designing, Deploying, and Architecting Secure AI Systems covers secure infrastructure/MLOps, APIs, defensive prompting, agent security, supply chain integrity, and Zero Trust patterns. Operationalizing AI Security and Responsibility addresses governance, risk, compliance (GRC), security operations, safety/alignment, and AI-driven misinformation. Building Sustainable AI Security Programs focuses on organizational capability, threat intelligence, collaboration, and the future of AI security. Throughout, you will gain access to practical insights and structured approaches applicable to real-world scenarios. By the end, you will be able to design, implement, and maintain security programs for generative AI, defend against advanced threats, communicate risks to stakeholders, and establish governance ensuring secure, compliant operations across the lifecycle.What you will learn Identify AI-specific risks and clearly communicate them to business teams Defend models, data, RAG, and agents from threats like poisoning, prompt injection, jailbreaking, and data exfiltration Design resilient cloud/MLOps with Zero Trust, supply chain security, and isolation Build secure APIs, apps, and agents with strong auth, validation, and safe tool use Apply AI-focused GRC, alignment checks, bias mitigation, monitoring, and incident response Translate complex concepts into actionable steps, using threat intel and collaboration for lasting security Who this book is forThis book is for mid- to senior-level cybersecurity professionals, security architects, and tech leaders managing risks in generative AI deployments. It’s also valuable for early-career practitioners, AI/ML engineers, red teamers, DevSecOps, governance specialists, compliance officers, and product stakeholders with foundational cybersecurity knowledge. Readers should have basic familiarity with security concepts, some exposure to cloud platforms (AWS, Azure, or GCP), and a fundamental grasp of AI/ML, though no prior AI security expertise is required.

Table of Contents:
Table of Contents

  1. Why AI Security Is Different
  2. Threat Modeling AI Systems
  3. The AI Attack Surface
  4. Foundations of AI Defense
  5. Anatomy of an AI System
  6. Prompt Injection and Jailbreaking
  7. Memory, Context, and State Abuse
  8. Attacks on RAG Systems
  9. Agent Architecture and Vulnerabilities
  10. Agent Exploitation Techniques
  11. Attacks on Training Data and Model Integrity
  12. AI Red Teaming and Evaluation
  13. Securing AI Infrastructure, MLOps, and Runtime Environments
  14. Building Secure AI Applications and APIs
  15. Defensive Prompt Engineering
  16. Guardrails and Human Oversight
  17. External Dependencies, Supply Chain Integrity & Multi-Tenant Risk
  18. Securing AI Agents with Zero Trust Architecture
  19. AI Governance, Risk, and Compliance
  20. AI Security Engineering
  21. AI Security Operations
  22. Building Sustainable AI Security Programs
  23. The Future of AI Security


About the Author :
Kris Kimmerle is a recognized leader in AI security and governance, currently driving strategic initiatives across global organizations. With over 20 years of experience spanning cybersecurity, cloud architecture, and artificial intelligence, Kris has helped international enterprises implement generative AI systems securely and in compliance with regulatory standards. His work bridges deep technical expertise with executive-level strategy, enabling organizations to scale AI without compromising trust, privacy, or resilience. He holds CISSP and AI Governance Professional (AIGP) certifications, along with specialized AI credentials from AWS, Azure, and Google Cloud. Kris is a trusted voice in the field, known for translating complex risks into practical guidance. He regularly speaks at industry events, advises global clients on securing AI across the development lifecycle, and publishes insights that shape the conversation on AI risk, governance, and security at scale. David Okeyode is a leading cloud security architect with extensive experience in Azure security consulting, training, and research. He has authored multiple cloud security courses and speaks at major cybersecurity events worldwide.


Best Sellers


Product Details
  • ISBN-13: 9781806119929
  • Publisher: Packt Publishing Limited
  • Publisher Imprint: Packt Publishing Limited
  • ISBN-10: 1806119927
  • Publisher Date: 30 Apr 2026


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
AI Under Attack
Packt Publishing Limited -
AI Under Attack
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

AI Under Attack

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    Your IP: 216.73.216.54 216.73.216.54 216.73.216.54