Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Generative AI with LangChain

You're reading from   Generative AI with LangChain Build production-ready LLM applications and advanced agents using Python, LangChain, and LangGraph

Arrow left icon
Product type Paperback
Published in May 2025
Publisher Packt
ISBN-13 9781837022014
Length 476 pages
Edition 2nd Edition
Languages
Concepts
Arrow right icon
Toc

Table of Contents (14) Chapters Close

Preface 1. The Rise of Generative AI: From Language Models to Agents 2. First Steps with LangChain FREE CHAPTER 3. Building Workflows with LangGraph 4. Building Intelligent RAG Systems 5. Building Intelligent Agents 6. Advanced Applications and Multi-Agent Systems 7. Software Development and Data Analysis Agents 8. Evaluation and Testing 9. Production-Ready LLM Deployment and Observability 10. The Future of Generative Models: Beyond Scaling 11. Other Books You May Enjoy 12. Index Appendix

Security considerations for LLM applications

LLMs introduce new security challenges that traditional web or application security measures weren’t designed to handle. Standard controls often fail against attacks unique to LLMs, and recent incidents—from prompt leaking in commercial chatbots to hallucinated legal citations—highlight the need for dedicated defenses.

LLM applications differ fundamentally from conventional software because they accept both system instructions and user data through the same text channel, produce nondeterministic outputs, and manage context in ways that can expose or mix up sensitive information. For example, attackers have extracted hidden system prompts by simply asking some models to repeat their instructions, and firms have suffered from models inventing fictitious legal precedents. Moreover, simple pattern‐matching filters can be bypassed by cleverly rephrased malicious inputs, making semantic‐aware defenses essential...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime