-
Book Overview & Buying
-
Table Of Contents
AI-Native LLM Security
By :
AI-Native LLM Security
By:
Overview of this book
Adversarial AI attacks present a unique set of security challenges, exploiting the very foundation of how AI learns. This book explores these threats in depth, equipping cybersecurity professionals with the tools needed to secure generative AI and LLM applications. Rather than skimming the surface of emerging risks, it focuses on practical strategies, industry standards, and recent research to build a robust defense framework.
Structured around actionable insights, the chapters introduce a secure-by-design methodology, integrating threat modeling and MLSecOps practices to fortify AI systems. You’ll discover how to leverage established taxonomies from OWASP, NIST, and MITRE to identify and mitigate vulnerabilities. Through real-world examples, the book highlights best practices for incorporating security controls into AI development life cycles, covering key areas such as CI/CD, MLOps, and open-access LLMs.
Built on the expertise of its co-authors—pioneers in the OWASP Top 10 for LLM applications—this guide also addresses the ethical implications of AI security, contributing to the broader conversation on trustworthy AI. By the end of this book, you’ll be able to develop, deploy, and secure AI technologies with confidence and clarity.
*Email sign-up and proof of purchase required
Table of Contents (23 chapters)
Preface
Chapter 1: Fundamentals and Introduction to Large Language Models
Chapter 2: Securing Large Language Models
Chapter 3: The Dual Nature of LLM Risks: Inherent Vulnerabilities and Malicious Actors
Chapter 4: Mapping Trust Boundaries in LLM Architectures
Chapter 5: Aligning LLM Security with Organizational Objectives and Regulatory Landscapes
Part 2: The OWASP Top 10 for LLM Applications
Chapter 6: Identifying and Prioritizing LLM Security Risks with OWASP
Chapter 7: Diving Deep: Profiles of the Top 10 LLM Security Risks
Chapter 8: Mitigating LLM Risks: Strategies and Techniques for Each OWASP Category
Chapter 9: Adapting the OWASP Top 10 to Diverse Deployment Scenarios
Part 3: Building Secure LLM Systems
Chapter 10: Designing LLM Systems for Security: Architecture, Controls, and Best Practices
Chapter 11: Integrating Security into the LLM Development Life Cycle: From Data Curation to Deployment
Chapter 12: Operational Resilience: Monitoring, Incident Response, and Continuous Improvement
Chapter 13: The Future of LLM Security: Emerging Threats, Promising Defenses, and the Path Forward
Index
Other Books You May Enjoy
Appendices: Latest OWASP Top 10 for LLM and OWASP AIVSS Agentic AI Core Risks
Appendix A: OWASP Top 10 for LLM Applications - 2025 Update
Appendix B: OWASP AIVSS Core Agentic AI Security Risks
Appendix C: Unlock Your Exclusive Benefits