1. Home
  2. About the authors
  3. Frequently Asked Questions (FAQ)
  4. License
  5. How to read this book?
  6. Attacks
  7. 1. Prompt Engineering
    1. 1.1. Bijection Learning
  8. 2. Model Architecture Exploitation
  9. 3. ML Systems
    1. 3.1. Attacks on Quantization Techniques
      1. 3.1.1. Adversarial Interferences on GGUF
    2. 3.2. Attacks on KV Cache
      1. 3.2.1. Prompt Leakage via KV Cache Sharing
  10. 4. Application Protocols
    1. 4.1. Model Context Protocol
      1. 4.1.1. Ghost Tool Shadowing
  11. Defenses and Guardrails
  12. 5. Cloud Guardrails
    1. 5.1. AWS Bedrock
  13. 6. Hardware Protections
  14. Alignment, Safety, and Responsible AI
  15. 7. Model Steering
  16. 8. Evaluations
  17. Conclusion
  18. 9. Appendix
    1. 9.1. Additional Reading

AI Security Handbook: Develop Secure AI Systems