Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Generative AI: Phishing and Cybersecurity Metrics (eBook)


ISBN13: 9781040128145
Published: October 2024
Publisher: CRC Press
Country of Publication: USA
Format: eBook (ePub)
Price: £24.99
The amount of VAT charged may change depending on your location of use.


The sale of some eBooks are restricted to certain countries. To alert you to such restrictions, please select the country of the billing address of your credit or debit card you wish to use for payment.

Billing Country:


Sale prohibited in
Korea, [North] Democratic Peoples Republic Of

Due to publisher restrictions, international orders for ebooks may need to be confirmed by our staff during shop opening hours. Our trading hours are Monday to Friday, 8.30am to 5.00pm, London, UK time.


The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.

For further information see https://www.wildy.com/ebook-formats


Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.

All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.

This eBook is available in the following formats: ePub.

In stock.
Need help with ebook formats?




Also available as

The Cybersecurity Landscape is for sure changing. For example, one of the oldest threat variants has been that of Phishing. It evolved in the early 1990s, but even today, it is still being used as a primary threat variant. But, it has become much more sophisticated, covert, and stealthy in nature. For example, now it can be used to launch Ransomware Attacks, Social Engineering, and Extortion like Attacks.

But the advent of Generative AI is making this much worse. For example, a Cyberattacker can now use something like ChatGPT to craft the content for Phishing Emails that are so convincing that it is almost to tell the difference of what is real and fake. This is also clearly evident in the use of Deepfakes, where real people are replicated into fake ones in order to create videos to lure the unsuspecting victims to a fake website.

But, Generative AI can also be used for the good also, to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:

  • A review of Phishing
  • A review of AI, Neural Networks, and Machine Learning
  • A review of Natural Language Processing, Generative AI, and the Digital Person
  • A Proposed Solution as to how Generative AI can combat Phishing Attacks, as they relate to Privileged Access Accounts.

Subjects:
eBooks, IT, Internet and Artificial Intelligence Law
Contents:
Chapter 1 INTRODUCTION TO PHISHING
Chapter 2 AN OVERVIEW INTO ARTIFICIAL INTELLIGENCE, NEURALNETWORKS, AND MACHINE LEARNING
Chapter 3 INTRODUCTION TO GENERATIVE AI, NATURAL LANGUAGE PROCESSING, AND THE DIGITAL PERSON
Chapter 4 REVIEW OF CYBERSECURITY METRICS
Chapter 5 CONCLUSIONS
Index