Securing AI:
Sponsored by Intel As AI becomes more pervasive, the question of how to build, test, and maintain risk-averse systems grows too. Join experts from the field to learn how they analyze and handle privacy, risk, and safety in their work. About the AI Superstream Series: This four-part series is packed...
Gespeichert in:
Beteiligte Personen: | , , , , , , |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
O'Reilly Media, Inc.
2021
|
Ausgabe: | [First edition]. |
Schriftenreihe: | O'Reilly superstream series
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0636920672319/?ar |
Zusammenfassung: | Sponsored by Intel As AI becomes more pervasive, the question of how to build, test, and maintain risk-averse systems grows too. Join experts from the field to learn how they analyze and handle privacy, risk, and safety in their work. About the AI Superstream Series: This four-part series is packed with insights from some of the brightest minds in AI. You'll get a deeper understanding of the latest tools and technologies that can help keep your organization competitive and learn to leverage AI to drive real business results. What you'll learn and how you can apply it Understand what secure AI does (and doesn't) include See what secure AI might look like from design through deployment Discover real-world technical applications of secure AI This recording of a live event is for you because... You're a machine learning engineer or data scientist interested in the challenges of building secure AI and machine learning tools. You want to better understand how industry experts handle security. You want to learn how to improve your AI and machine learning systems. Recommended follow-up: Read (report) AI and the Law. |
Beschreibung: | Sponsored by Intel. - Online resource; title from title details screen (O'Reilly, viewed March 8, 2022) |
Umfang: | 1 Online-Ressource (1 video file (3 hr., 11 min.)) sound, color. |
Internformat
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-072483695 | ||
003 | DE-627-1 | ||
005 | 20240228121615.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 220112s2021 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)072483695 | ||
035 | |a (DE-599)KEP072483695 | ||
035 | |a (ORHE)0636920672319 | ||
035 | |a (DE-627-1)072483695 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Securing AI |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b O'Reilly Media, Inc. |c 2021 | |
300 | |a 1 Online-Ressource (1 video file (3 hr., 11 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a O'Reilly superstream series | |
500 | |a Sponsored by Intel. - Online resource; title from title details screen (O'Reilly, viewed March 8, 2022) | ||
520 | |a Sponsored by Intel As AI becomes more pervasive, the question of how to build, test, and maintain risk-averse systems grows too. Join experts from the field to learn how they analyze and handle privacy, risk, and safety in their work. About the AI Superstream Series: This four-part series is packed with insights from some of the brightest minds in AI. You'll get a deeper understanding of the latest tools and technologies that can help keep your organization competitive and learn to leverage AI to drive real business results. What you'll learn and how you can apply it Understand what secure AI does (and doesn't) include See what secure AI might look like from design through deployment Discover real-world technical applications of secure AI This recording of a live event is for you because... You're a machine learning engineer or data scientist interested in the challenges of building secure AI and machine learning tools. You want to better understand how industry experts handle security. You want to learn how to improve your AI and machine learning systems. Recommended follow-up: Read (report) AI and the Law. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Artificial intelligence | |
650 | 0 | |a Computer networks | |
650 | 2 | |a Computer Security | |
650 | 2 | |a Artificial Intelligence | |
650 | 2 | |a Computer Communication Networks | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Intelligence artificielle | |
650 | 4 | |a Réseaux d'ordinateurs | |
650 | 4 | |a artificial intelligence | |
650 | 4 | |a Artificial intelligence |0 (OCoLC)fst00817247 | |
650 | 4 | |a Computer networks |0 (OCoLC)fst00872297 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
650 | 4 | |a Instructional films |0 (OCoLC)fst01726236 | |
650 | 4 | |a Internet videos |0 (OCoLC)fst01750214 | |
650 | 4 | |a Nonfiction films |0 (OCoLC)fst01710269 | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
655 | 2 | |a Webcast | |
700 | 1 | |a Manjengwa, Shingai |e PräsentatorIn |4 pre | |
700 | 1 | |a Gomo, Tendai |e VerfasserIn |4 aut | |
700 | 1 | |a Dai, Jason |e VerfasserIn |4 aut | |
700 | 1 | |a Alani, Mohammed M. |e VerfasserIn |4 aut | |
700 | 1 | |a Thaine, Patricia |e VerfasserIn |4 aut | |
700 | 1 | |a Sengupta, Arijit |e VerfasserIn |4 aut | |
700 | 1 | |a Jackson, Ethan C. |e VerfasserIn |4 aut | |
700 | 1 | |a Dullerud, Natalie |e VerfasserIn |4 aut | |
710 | 2 | |a O'Reilly (Firm), |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0636920672319/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-072483695 |
---|---|
_version_ | 1821494944829800448 |
adam_text | |
any_adam_object | |
author | Gomo, Tendai Dai, Jason Alani, Mohammed M. Thaine, Patricia Sengupta, Arijit Jackson, Ethan C. Dullerud, Natalie |
author_facet | Gomo, Tendai Dai, Jason Alani, Mohammed M. Thaine, Patricia Sengupta, Arijit Jackson, Ethan C. Dullerud, Natalie |
author_role | aut aut aut aut aut aut aut |
author_sort | Gomo, Tendai |
author_variant | t g tg j d jd m m a mm mma p t pt a s as e c j ec ecj n d nd |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)072483695 (DE-599)KEP072483695 (ORHE)0636920672319 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03731cgm a22007332 4500</leader><controlfield tag="001">ZDB-30-ORH-072483695</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121615.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220112s2021 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)072483695</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP072483695</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0636920672319</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)072483695</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing AI</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (3 hr., 11 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">O'Reilly superstream series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Sponsored by Intel. - Online resource; title from title details screen (O'Reilly, viewed March 8, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Sponsored by Intel As AI becomes more pervasive, the question of how to build, test, and maintain risk-averse systems grows too. Join experts from the field to learn how they analyze and handle privacy, risk, and safety in their work. About the AI Superstream Series: This four-part series is packed with insights from some of the brightest minds in AI. You'll get a deeper understanding of the latest tools and technologies that can help keep your organization competitive and learn to leverage AI to drive real business results. What you'll learn and how you can apply it Understand what secure AI does (and doesn't) include See what secure AI might look like from design through deployment Discover real-world technical applications of secure AI This recording of a live event is for you because... You're a machine learning engineer or data scientist interested in the challenges of building secure AI and machine learning tools. You want to better understand how industry experts handle security. You want to learn how to improve your AI and machine learning systems. Recommended follow-up: Read (report) AI and the Law.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield><subfield code="0">(OCoLC)fst00817247</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="0">(OCoLC)fst00872297</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield><subfield code="0">(OCoLC)fst01726236</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield><subfield code="0">(OCoLC)fst01750214</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield><subfield code="0">(OCoLC)fst01710269</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="655" ind1=" " ind2="2"><subfield code="a">Webcast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manjengwa, Shingai</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gomo, Tendai</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dai, Jason</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alani, Mohammed M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thaine, Patricia</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sengupta, Arijit</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jackson, Ethan C.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dullerud, Natalie</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly (Firm),</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0636920672319/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
genre | Webcast |
genre_facet | Webcast |
id | ZDB-30-ORH-072483695 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:26Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (3 hr., 11 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
series2 | O'Reilly superstream series |
spelling | Securing AI [First edition]. [Place of publication not identified] O'Reilly Media, Inc. 2021 1 Online-Ressource (1 video file (3 hr., 11 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier O'Reilly superstream series Sponsored by Intel. - Online resource; title from title details screen (O'Reilly, viewed March 8, 2022) Sponsored by Intel As AI becomes more pervasive, the question of how to build, test, and maintain risk-averse systems grows too. Join experts from the field to learn how they analyze and handle privacy, risk, and safety in their work. About the AI Superstream Series: This four-part series is packed with insights from some of the brightest minds in AI. You'll get a deeper understanding of the latest tools and technologies that can help keep your organization competitive and learn to leverage AI to drive real business results. What you'll learn and how you can apply it Understand what secure AI does (and doesn't) include See what secure AI might look like from design through deployment Discover real-world technical applications of secure AI This recording of a live event is for you because... You're a machine learning engineer or data scientist interested in the challenges of building secure AI and machine learning tools. You want to better understand how industry experts handle security. You want to learn how to improve your AI and machine learning systems. Recommended follow-up: Read (report) AI and the Law. Computer security Artificial intelligence Computer networks Computer Security Artificial Intelligence Computer Communication Networks Sécurité informatique Intelligence artificielle Réseaux d'ordinateurs artificial intelligence Artificial intelligence (OCoLC)fst00817247 Computer networks (OCoLC)fst00872297 Computer security (OCoLC)fst00872484 Instructional films (OCoLC)fst01726236 Internet videos (OCoLC)fst01750214 Nonfiction films (OCoLC)fst01710269 Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Webcast Manjengwa, Shingai PräsentatorIn pre Gomo, Tendai VerfasserIn aut Dai, Jason VerfasserIn aut Alani, Mohammed M. VerfasserIn aut Thaine, Patricia VerfasserIn aut Sengupta, Arijit VerfasserIn aut Jackson, Ethan C. VerfasserIn aut Dullerud, Natalie VerfasserIn aut O'Reilly (Firm), Verlag pbl |
spellingShingle | Gomo, Tendai Dai, Jason Alani, Mohammed M. Thaine, Patricia Sengupta, Arijit Jackson, Ethan C. Dullerud, Natalie Securing AI Computer security Artificial intelligence Computer networks Computer Security Artificial Intelligence Computer Communication Networks Sécurité informatique Intelligence artificielle Réseaux d'ordinateurs artificial intelligence Artificial intelligence (OCoLC)fst00817247 Computer networks (OCoLC)fst00872297 Computer security (OCoLC)fst00872484 Instructional films (OCoLC)fst01726236 Internet videos (OCoLC)fst01750214 Nonfiction films (OCoLC)fst01710269 Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
subject_GND | (OCoLC)fst00817247 (OCoLC)fst00872297 (OCoLC)fst00872484 (OCoLC)fst01726236 (OCoLC)fst01750214 (OCoLC)fst01710269 |
title | Securing AI |
title_auth | Securing AI |
title_exact_search | Securing AI |
title_full | Securing AI |
title_fullStr | Securing AI |
title_full_unstemmed | Securing AI |
title_short | Securing AI |
title_sort | securing ai |
topic | Computer security Artificial intelligence Computer networks Computer Security Artificial Intelligence Computer Communication Networks Sécurité informatique Intelligence artificielle Réseaux d'ordinateurs artificial intelligence Artificial intelligence (OCoLC)fst00817247 Computer networks (OCoLC)fst00872297 Computer security (OCoLC)fst00872484 Instructional films (OCoLC)fst01726236 Internet videos (OCoLC)fst01750214 Nonfiction films (OCoLC)fst01710269 Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer security Artificial intelligence Computer networks Computer Security Artificial Intelligence Computer Communication Networks Sécurité informatique Intelligence artificielle Réseaux d'ordinateurs artificial intelligence Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet Webcast |
work_keys_str_mv | AT manjengwashingai securingai AT gomotendai securingai AT daijason securingai AT alanimohammedm securingai AT thainepatricia securingai AT senguptaarijit securingai AT jacksonethanc securingai AT dullerudnatalie securingai AT oreillyfirm securingai |