-
Book Overview & Buying
-
Table Of Contents
AI-Native LLM Security
By :
This part focuses on understanding, identifying, and addressing the key security risks in LLM applications using the OWASP framework. It begins by introducing the OWASP Top 10 for LLM Applications and explaining how it helps organizations recognize and prioritize the most critical security issues. The following chapters take a closer look at each of these risks, such as prompt injection, data poisoning, and model theft, describing how they appear in real-world systems. The section then provides practical methods for mitigating these risks through strategies like input validation, authentication, encryption, and secure deployment. Finally, it shows how to adapt these security principles to different use cases and deployment environments, helping readers apply OWASP guidance effectively across various LLM-based applications.
This part has the following chapters:
Change the font size
Change margin width
Change background colour