Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Pearson
2024
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780138361600/?ar |
Zusammenfassung: | Ethical development and responsible deployment of AI and ML systems. Learn the latest technology in AI and ML security to safeguard against AI attackers and ensure data integrity and user privacy. Navigate privacy and ethical considerations to gain insights into responsible AI practices and address ethical consideration. Explore emerging trends and future directions in AI, ML, security, ethics, and privacy focusing on key concepts including threats, vulnerabilities, and attack vectors. Recognize and understand the privacy aspects of AI and ML, including data protection, anonymization, and regulatory compliance Get the essential skills to protect your AI system against cyber attacks. Explore how generative AI and LLMs can be harnessed to secure your projects and organizations against AI cyber threats. Develop secure and ethical systems while being mindful of privacy concerns with real-life examples that we use on a daily-basis with ChatGPT, GitHub Co-pilot, DALL-E, Midjourney, DreamStudio (Stable Diffusion), and others. Gain a solid foundation in AI and ML principles and be better prepared to develop secure and ethical systems while being mindful of privacy concerns. Authors Omar Santos and Dr. Petar Radanliev are industry experts to guide and boost your AI security knowledge. Related Learning: Sign up for live training classes by Omar Santos. Read Beyond the Algorithm: AI, Security, Privacy, and Ethics by Omar Santos and Petar Radanliev. About the Instructors: Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, cybersecurity research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of more than 25 books, 21 video courses, and nore than 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs. Prior to Cisco, Omar served in the United States Marines focusing on the deployment, testing, and maintenance of Command, Control, Communications, and Computer and Intelligence (C4I) systems. Dr. Petar Radanliev, Department of Engineering Science, University of Oxford. Dr. Radanliev is a highly accomplished and experienced cybersecurity professional with 10+ years of experience in academic and industry settings. He has expertise in cybersecur ity research, risk management, and cyber defense, as well as a track record of excellence in teaching, mentoring, and leading research teams. Technical skills include new and emerging technical cyber/crypto technologies and algorithms, DeFi, blockchain, Metaverse, and quantum cryptography. Petar obtained a PhD at University of Wales in 2014, and continued with postdoctoral research at Imperial College London, University of Cambridge, Massachusetts Institute of Technology, and University of Oxford. His awards include the Fulbright Fellowship in the United States, and the Prince of Wales Innovation Scholarship in the United Kingdom. Skill Level : Intermediate Course requirement: None. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed April 2, 2024) |
Umfang: | 1 Online-Ressource (1 video file (4 hr., 56 min.)) sound, color. |
ISBN: | 9780138361600 0138361606 |
Internformat
MARC
LEADER | 00000cgm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102208492 | ||
003 | DE-627-1 | ||
005 | 20241129125349.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240404s2024 xx ||| |o o ||eng c | ||
020 | |a 9780138361600 |c electronic video |9 978-0-13-836160-0 | ||
020 | |a 0138361606 |c electronic video |9 0-13-836160-6 | ||
035 | |a (DE-627-1)102208492 | ||
035 | |a (DE-599)KEP102208492 | ||
035 | |a (ORHE)9780138361600 | ||
035 | |a (DE-627-1)102208492 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240402 | |
245 | 0 | 0 | |a AI security and responsible AI practices |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Pearson |c 2024 | |
300 | |a 1 Online-Ressource (1 video file (4 hr., 56 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed April 2, 2024) | ||
520 | |a Ethical development and responsible deployment of AI and ML systems. Learn the latest technology in AI and ML security to safeguard against AI attackers and ensure data integrity and user privacy. Navigate privacy and ethical considerations to gain insights into responsible AI practices and address ethical consideration. Explore emerging trends and future directions in AI, ML, security, ethics, and privacy focusing on key concepts including threats, vulnerabilities, and attack vectors. Recognize and understand the privacy aspects of AI and ML, including data protection, anonymization, and regulatory compliance Get the essential skills to protect your AI system against cyber attacks. Explore how generative AI and LLMs can be harnessed to secure your projects and organizations against AI cyber threats. Develop secure and ethical systems while being mindful of privacy concerns with real-life examples that we use on a daily-basis with ChatGPT, GitHub Co-pilot, DALL-E, Midjourney, DreamStudio (Stable Diffusion), and others. Gain a solid foundation in AI and ML principles and be better prepared to develop secure and ethical systems while being mindful of privacy concerns. Authors Omar Santos and Dr. Petar Radanliev are industry experts to guide and boost your AI security knowledge. Related Learning: Sign up for live training classes by Omar Santos. Read Beyond the Algorithm: AI, Security, Privacy, and Ethics by Omar Santos and Petar Radanliev. About the Instructors: Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, cybersecurity research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of more than 25 books, 21 video courses, and nore than 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs. Prior to Cisco, Omar served in the United States Marines focusing on the deployment, testing, and maintenance of Command, Control, Communications, and Computer and Intelligence (C4I) systems. Dr. Petar Radanliev, Department of Engineering Science, University of Oxford. Dr. Radanliev is a highly accomplished and experienced cybersecurity professional with 10+ years of experience in academic and industry settings. He has expertise in cybersecur ity research, risk management, and cyber defense, as well as a track record of excellence in teaching, mentoring, and leading research teams. Technical skills include new and emerging technical cyber/crypto technologies and algorithms, DeFi, blockchain, Metaverse, and quantum cryptography. Petar obtained a PhD at University of Wales in 2014, and continued with postdoctoral research at Imperial College London, University of Cambridge, Massachusetts Institute of Technology, and University of Oxford. His awards include the Fulbright Fellowship in the United States, and the Prince of Wales Innovation Scholarship in the United Kingdom. Skill Level : Intermediate Course requirement: None. | ||
650 | 0 | |a Artificial intelligence |x Computer programs |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Natural language generation (Computer science) | |
650 | 4 | |a Intelligence artificielle ; Logiciels ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Génération automatique de texte | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Santos, Omar |e MitwirkendeR |4 ctb | |
700 | 1 | |a Radanliev, Peter |e MitwirkendeR |4 ctb | |
710 | 2 | |a Pearson (Firm), |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780138361600/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | 1 | |a ZDB-30-ORH |d 20241129 | |
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102208492 |
---|---|
_version_ | 1835903234555772928 |
adam_text | |
any_adam_object | |
author2 | Santos, Omar Radanliev, Peter |
author2_role | ctb ctb |
author2_variant | o s os p r pr |
author_facet | Santos, Omar Radanliev, Peter |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102208492 (DE-599)KEP102208492 (ORHE)9780138361600 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05762cgm a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-102208492</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241129125349.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240404s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780138361600</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-0-13-836160-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0138361606</subfield><subfield code="c">electronic video</subfield><subfield code="9">0-13-836160-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102208492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102208492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780138361600</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102208492</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240402</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">AI security and responsible AI practices</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Pearson</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (4 hr., 56 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed April 2, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Ethical development and responsible deployment of AI and ML systems. Learn the latest technology in AI and ML security to safeguard against AI attackers and ensure data integrity and user privacy. Navigate privacy and ethical considerations to gain insights into responsible AI practices and address ethical consideration. Explore emerging trends and future directions in AI, ML, security, ethics, and privacy focusing on key concepts including threats, vulnerabilities, and attack vectors. Recognize and understand the privacy aspects of AI and ML, including data protection, anonymization, and regulatory compliance Get the essential skills to protect your AI system against cyber attacks. Explore how generative AI and LLMs can be harnessed to secure your projects and organizations against AI cyber threats. Develop secure and ethical systems while being mindful of privacy concerns with real-life examples that we use on a daily-basis with ChatGPT, GitHub Co-pilot, DALL-E, Midjourney, DreamStudio (Stable Diffusion), and others. Gain a solid foundation in AI and ML principles and be better prepared to develop secure and ethical systems while being mindful of privacy concerns. Authors Omar Santos and Dr. Petar Radanliev are industry experts to guide and boost your AI security knowledge. Related Learning: Sign up for live training classes by Omar Santos. Read Beyond the Algorithm: AI, Security, Privacy, and Ethics by Omar Santos and Petar Radanliev. About the Instructors: Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, cybersecurity research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of more than 25 books, 21 video courses, and nore than 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs. Prior to Cisco, Omar served in the United States Marines focusing on the deployment, testing, and maintenance of Command, Control, Communications, and Computer and Intelligence (C4I) systems. Dr. Petar Radanliev, Department of Engineering Science, University of Oxford. Dr. Radanliev is a highly accomplished and experienced cybersecurity professional with 10+ years of experience in academic and industry settings. He has expertise in cybersecur ity research, risk management, and cyber defense, as well as a track record of excellence in teaching, mentoring, and leading research teams. Technical skills include new and emerging technical cyber/crypto technologies and algorithms, DeFi, blockchain, Metaverse, and quantum cryptography. Petar obtained a PhD at University of Wales in 2014, and continued with postdoctoral research at Imperial College London, University of Cambridge, Massachusetts Institute of Technology, and University of Oxford. His awards include the Fulbright Fellowship in the United States, and the Prince of Wales Innovation Scholarship in the United Kingdom. Skill Level : Intermediate Course requirement: None.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield><subfield code="x">Computer programs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Natural language generation (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle ; Logiciels ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Génération automatique de texte</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Santos, Omar</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Radanliev, Peter</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Pearson (Firm),</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780138361600/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1="1" ind2=" "><subfield code="a">ZDB-30-ORH</subfield><subfield code="d">20241129</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102208492 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:16:02Z |
institution | BVB |
isbn | 9780138361600 0138361606 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (4 hr., 56 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Pearson |
record_format | marc |
spelling | AI security and responsible AI practices [First edition]. [Place of publication not identified] Pearson 2024 1 Online-Ressource (1 video file (4 hr., 56 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed April 2, 2024) Ethical development and responsible deployment of AI and ML systems. Learn the latest technology in AI and ML security to safeguard against AI attackers and ensure data integrity and user privacy. Navigate privacy and ethical considerations to gain insights into responsible AI practices and address ethical consideration. Explore emerging trends and future directions in AI, ML, security, ethics, and privacy focusing on key concepts including threats, vulnerabilities, and attack vectors. Recognize and understand the privacy aspects of AI and ML, including data protection, anonymization, and regulatory compliance Get the essential skills to protect your AI system against cyber attacks. Explore how generative AI and LLMs can be harnessed to secure your projects and organizations against AI cyber threats. Develop secure and ethical systems while being mindful of privacy concerns with real-life examples that we use on a daily-basis with ChatGPT, GitHub Co-pilot, DALL-E, Midjourney, DreamStudio (Stable Diffusion), and others. Gain a solid foundation in AI and ML principles and be better prepared to develop secure and ethical systems while being mindful of privacy concerns. Authors Omar Santos and Dr. Petar Radanliev are industry experts to guide and boost your AI security knowledge. Related Learning: Sign up for live training classes by Omar Santos. Read Beyond the Algorithm: AI, Security, Privacy, and Ethics by Omar Santos and Petar Radanliev. About the Instructors: Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, cybersecurity research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of more than 25 books, 21 video courses, and nore than 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs. Prior to Cisco, Omar served in the United States Marines focusing on the deployment, testing, and maintenance of Command, Control, Communications, and Computer and Intelligence (C4I) systems. Dr. Petar Radanliev, Department of Engineering Science, University of Oxford. Dr. Radanliev is a highly accomplished and experienced cybersecurity professional with 10+ years of experience in academic and industry settings. He has expertise in cybersecur ity research, risk management, and cyber defense, as well as a track record of excellence in teaching, mentoring, and leading research teams. Technical skills include new and emerging technical cyber/crypto technologies and algorithms, DeFi, blockchain, Metaverse, and quantum cryptography. Petar obtained a PhD at University of Wales in 2014, and continued with postdoctoral research at Imperial College London, University of Cambridge, Massachusetts Institute of Technology, and University of Oxford. His awards include the Fulbright Fellowship in the United States, and the Prince of Wales Innovation Scholarship in the United Kingdom. Skill Level : Intermediate Course requirement: None. Artificial intelligence Computer programs Security measures Computer networks Security measures Natural language generation (Computer science) Intelligence artificielle ; Logiciels ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Génération automatique de texte Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Santos, Omar MitwirkendeR ctb Radanliev, Peter MitwirkendeR ctb Pearson (Firm), Verlag pbl |
spellingShingle | AI security and responsible AI practices Artificial intelligence Computer programs Security measures Computer networks Security measures Natural language generation (Computer science) Intelligence artificielle ; Logiciels ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Génération automatique de texte Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | AI security and responsible AI practices |
title_auth | AI security and responsible AI practices |
title_exact_search | AI security and responsible AI practices |
title_full | AI security and responsible AI practices |
title_fullStr | AI security and responsible AI practices |
title_full_unstemmed | AI security and responsible AI practices |
title_short | AI security and responsible AI practices |
title_sort | ai security and responsible ai practices |
topic | Artificial intelligence Computer programs Security measures Computer networks Security measures Natural language generation (Computer science) Intelligence artificielle ; Logiciels ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Génération automatique de texte Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Artificial intelligence Computer programs Security measures Computer networks Security measures Natural language generation (Computer science) Intelligence artificielle ; Logiciels ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Génération automatique de texte Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT santosomar aisecurityandresponsibleaipractices AT radanlievpeter aisecurityandresponsibleaipractices AT pearsonfirm aisecurityandresponsibleaipractices |