磁力管家

磁力管家

BT种子名称

分享给好友

BT种子基本信息

  • 种子哈希:607de8f602ed8de16964e41a8483f1fc32a706fb
  • 文档大小:886.8 MB
  • 文档个数:34个文档
  • 下载次数:1388
  • 下载速度:极快
  • 收录时间:2024-10-23
  • 最近下载:2025-05-16
  • DMCA/屏蔽:DMCA/屏蔽

下载磁力链接

magnet:?xt=urn:btih:607DE8F602ED8DE16964E41A8483F1FC32A706FBmagnet:?xt=urn:btih:607DE8F602ED8DE16964E41A8483F1FC32A706FB
复制磁力链接到utorrent、Bitcomet、迅雷、115、百度网盘等下载工具进行下载。
Securing Generative AI的二维码

文档列表

  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/006. 3.5 Securing Amazon BedRock, SageMaker, Microsoft Azure AI Services, and Other Environments.mp4 71.1 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/002. 2.1 Defining Prompt Injection Attacks.mp4 69.3 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/002. 6.1 Understanding the RAG, LangChain, Llama Index, and AI Orchestration.mp4 62.2 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/005. 3.4 Best Practices when Using Open-Source Models from Hugging Face and Other Sources.mp4 54.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/004. 5.3 Understanding Red Teaming of AI Models.mp4 51.4 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/002. 1.1 Understanding the Significance of LLMs in the AI Landscape.mp4 51.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/004. 6.3 Securing Vector Databases.mp4 43.6 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/004. 2.3 Using ChatML for OpenAI API Calls to Indicate to the LLM the Source of Prompt Input.mp4 40.1 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/004. 3.3 Understanding the Risks of the AI and ML Supply Chain.mp4 38.0 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/004. 1.3 Introducing Retrieval Augmented Generation (RAG).mp4 35.6 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/003. 6.2 Securing Embedding Models.mp4 30.6 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/006. 1.5 Exploring the MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) Framework.mp4 27.1 MB
  • mp4Lesson 6 Protecting Retrieval Augmented Generation (RAG) Implementations/005. 6.4 Monitoring and Incident Response.mp4 24.5 MB
  • mp4Lesson 3 Training Data Poisoning, Model Denial of Service & Supply Chain Vulnerabilities/002. 3.1 Understanding Training Data Poisoning Attacks.mp4 22.9 MB
  • mp4Lesson 5 Overreliance, Model Theft, and Red Teaming AI Models/002. 5.1 Understanding Overreliance.mp4 22.2 MB
  • mp4Lesson 1 Introduction to AI Threats and LLM Security/005. 1.4 Understanding the OWASP Top-10 Risks for LLMs.mp4 21.9 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/008. 2.7 Using the OWASP ASVS to Protect Against Insecure Output Handling.mp4 21.0 MB
  • mp4Introduction/001. Securing Generative AI Introduction.mp4 19.7 MB
  • mp4Lesson 4 Sensitive Information Disclosure, Insecure Plugin Design, and Excessive Agency/002. 4.1 Understanding Sensitive Information Disclosure.mp4 19.0 MB
  • mp4Lesson 2 Understanding Prompt Injection & Insecure Output Handling/003. 2.2 Exploring Real-life Prompt Injection Attacks.mp4 18.0 MB
  • ==查看完整文档列表==