Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Generative AI: (Record no. 13524)

MARC details
000 -LEADER
fixed length control field 02415nam a22003017a 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-NcFUE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260212141628.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251112s2025 ua|a|||| |||| 00| 0deng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032822686
040 ## - CATALOGING SOURCE
Language of cataloging eng
043 ## - GEOGRAPHIC AREA CODE
Geographic area code ua
082 #4 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number DRG
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Das, Ravindra.
9 (RLIN) 34363
245 1# - TITLE STATEMENT
Title Generative AI:
Remainder of title Phishing and Cybersecurity Metrics/
Statement of responsibility, etc Ravindra Das.
250 ## - EDITION STATEMENT
Edition statement 1st edition.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton:
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc ©2025.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 280 p. :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.<br/><br/>The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.<br/><br/>But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:<br/><br/>A review of phishing<br/>A review of AI, Neural Networks, and Machine Learning<br/>A review of Natural Language Processing, Generative AI, and the Digital Person<br/>A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Acknowledgements. Chapter 1 Introduction to Phishing. Chapter 2 Overview of Artificial Intelligence, Neural Networks, and Machine Learning. Chapter 3 Introduction to Generative AI, Natural Language Processing, and the Digital Person. Chapter 4 Review of Cybersecurity Metrics. Chapter 5 Conclusions. Index.
650 17 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Database security.
Source of heading or term qarmk.
9 (RLIN) 25959
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
9 (RLIN) 33122
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 13076
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security measures
9 (RLIN) 34364
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( General ) Main library Main library 12/11/2025 Al Ahram   005.8 DRG 00017628 12/11/2025 C.1 12/11/2025 Books