Post-Quantum Security for AI: Resilient Digital Security in the Age of Artificial General Intelligence and Technological Singularity

Prepare for the future of cybersecurity--where quantum computing and AGI collide to reshape the rules of digital defense.

 

Quantum computing and Artificial General Intelligence (AGI) are poised to revolutionize the digital world--but they also introduce unprecedented security risks. These advancements have the potential to break modern encryption, manipulate digital identities, and bypass traditional cybersecurity defenses, leaving financial systems, government records, and private data dangerously exposed.

 

In Post-Quantum Security for AI, industry expert Petar Radanliev provides a comprehensive guide to safeguarding digital infrastructure against quantum and AI-driven cyber threats. This essential resource explores the vulnerabilities posed by quantum computing, the evolving risks of AGI, and the next-generation cryptographic solutions designed to counteract them. Readers will gain insight into quantum-resistant encryption, decentralized digital identity management, blockchain security strategies, and real-world implementation frameworks for enterprises and governments.

 

With a unique dual focus on AGI and quantum threats--areas often treated separately--this book delivers practical, forward-looking security strategies backed by case studies and expert analysis. Whether you're a cybersecurity professional, IT leader, policymaker, cryptographer, or developer, this book equips you with the critical knowledge and tools to navigate the future of digital security. The security landscape is changing fast—are you ready for it?

 

The security landscape is evolving--equip yourself now, before the future arrives unencrypted.

1147485559
Post-Quantum Security for AI: Resilient Digital Security in the Age of Artificial General Intelligence and Technological Singularity

Prepare for the future of cybersecurity--where quantum computing and AGI collide to reshape the rules of digital defense.

 

Quantum computing and Artificial General Intelligence (AGI) are poised to revolutionize the digital world--but they also introduce unprecedented security risks. These advancements have the potential to break modern encryption, manipulate digital identities, and bypass traditional cybersecurity defenses, leaving financial systems, government records, and private data dangerously exposed.

 

In Post-Quantum Security for AI, industry expert Petar Radanliev provides a comprehensive guide to safeguarding digital infrastructure against quantum and AI-driven cyber threats. This essential resource explores the vulnerabilities posed by quantum computing, the evolving risks of AGI, and the next-generation cryptographic solutions designed to counteract them. Readers will gain insight into quantum-resistant encryption, decentralized digital identity management, blockchain security strategies, and real-world implementation frameworks for enterprises and governments.

 

With a unique dual focus on AGI and quantum threats--areas often treated separately--this book delivers practical, forward-looking security strategies backed by case studies and expert analysis. Whether you're a cybersecurity professional, IT leader, policymaker, cryptographer, or developer, this book equips you with the critical knowledge and tools to navigate the future of digital security. The security landscape is changing fast—are you ready for it?

 

The security landscape is evolving--equip yourself now, before the future arrives unencrypted.

47.99 In Stock
Post-Quantum Security for AI: Resilient Digital Security in the Age of Artificial General Intelligence and Technological Singularity

Post-Quantum Security for AI: Resilient Digital Security in the Age of Artificial General Intelligence and Technological Singularity

by Petar Radanliev
Post-Quantum Security for AI: Resilient Digital Security in the Age of Artificial General Intelligence and Technological Singularity

Post-Quantum Security for AI: Resilient Digital Security in the Age of Artificial General Intelligence and Technological Singularity

by Petar Radanliev

eBook

$47.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Prepare for the future of cybersecurity--where quantum computing and AGI collide to reshape the rules of digital defense.

 

Quantum computing and Artificial General Intelligence (AGI) are poised to revolutionize the digital world--but they also introduce unprecedented security risks. These advancements have the potential to break modern encryption, manipulate digital identities, and bypass traditional cybersecurity defenses, leaving financial systems, government records, and private data dangerously exposed.

 

In Post-Quantum Security for AI, industry expert Petar Radanliev provides a comprehensive guide to safeguarding digital infrastructure against quantum and AI-driven cyber threats. This essential resource explores the vulnerabilities posed by quantum computing, the evolving risks of AGI, and the next-generation cryptographic solutions designed to counteract them. Readers will gain insight into quantum-resistant encryption, decentralized digital identity management, blockchain security strategies, and real-world implementation frameworks for enterprises and governments.

 

With a unique dual focus on AGI and quantum threats--areas often treated separately--this book delivers practical, forward-looking security strategies backed by case studies and expert analysis. Whether you're a cybersecurity professional, IT leader, policymaker, cryptographer, or developer, this book equips you with the critical knowledge and tools to navigate the future of digital security. The security landscape is changing fast—are you ready for it?

 

The security landscape is evolving--equip yourself now, before the future arrives unencrypted.


Product Details

ISBN-13: 9780135435991
Publisher: Pearson Education
Publication date: 07/23/2025
Sold by: Barnes & Noble
Format: eBook
File size: 17 MB
Note: This product may take a few minutes to download.
Age Range: 18 Years

About the Author

PETAR RADANLIEV obtained his PhD at the University of Wales in 2014 before becoming a Post-Doctoral Research Associate at the Department of Computer Science at the University of Oxford. His current research focuses on artificial intelligence, cybersecurity, quantum computing, and blockchain technology. Before joining academia, Dr. Petar Radanliev spent ten years as a Cybersecurity Manager for RBS--the largest bank in the world at the time--and five years as a Lead Penetration Tester for the Ministry for Defence.

Table of Contents

Preface.. . . . . . . . . . . . . . . . . xv

PART I Introduction to the Technological Threats.. . . . . . . . 1

Chapter 1 Understanding the Technological Singularity.. . . . . . . 3

    Objectives.. . . . . . . . . . . . . . 3

    Technological Singularity.. . . . . . . . . . . 4

    Defining the Technological Singularity. . . . . . . . . 5

    The Evolution of AGI.. . . . . . . . . . . . 8

    Risk of the Singularity.. . . . . . . . . . . . 11

    Summary. . . . . . . . . . . . . . 18

    References. . . . . . . . . . . . . . 19

Chapter 2 Quantum Computing and Its Implications.. . . . . . . 27

    Objectives.. . . . . . . . . . . . . . 27

    Basics of Quantum Computing. . . . . . . . . . 28

    Quantum Computing’s Threat to Cryptography.. . . . . . . 29

    Future of Quantum Technologies: Comparative Analysis.. . . . . 40

    Summary. . . . . . . . . . . . . . 42

    References. . . . . . . . . . . . . . 43

PART II Defining the Concept of Digital Security by Design.. . . . . 51

Chapter 3 Current Digital Security Systems.. . . . . . . . . . 53

    Objectives.. . . . . . . . . . . . . . 53

    Overview of Digital Identity Systems.. . . . . . . . . 54

    Public-Key Infrastructure (PKI) and Its Limitations.. . . . . . 60

    Decentralized Security Models: Blockchain and Beyond. . . . . 65

    Summary. . . . . . . . . . . . . . 70

    References. . . . . . . . . . . . . . 70

Chapter 4 The Opportunities and Risks Related to Artificial General Intelligence (AGI) in Cybersecurity.. . 79

    Objectives.. . . . . . . . . . . . . . 79

    AGI Capabilities in Autonomous Attacks. . . . . . . . 80

    How AGI Poses Unique Security Threats.. . . . . . . . 86

    Case Studies of AI-Driven Cyberattacks. . . . . . . . . 89

    Summary. . . . . . . . . . . . . . 99

    References. . . . . . . . . . . . . . 99

PART III Quantum-Resistant Cryptography.. . . . . . . . . 105

Chapter 5 Post-Quantum Cryptography: The New NIST Standards.. . . . 107

    Objectives.. . . . . . . . . . . . . . 107

    Lattice-Based Cryptography.. . . . . . . . . . 108

    Ring Learning with Errors.. . . . . . . . . . . 114

    NIST Standards for Post-Quantum Cryptography.. . . . . . 122

    Case Study: Behavioral Analysis with Falcon X AI: Analyzing Advanced Quantum Malware Strains.. . 127

    Summary. . . . . . . . . . . . . . 144

    References. . . . . . . . . . . . . . 145

Chapter 6 Implementing Quantum-Safe Solutions.. . . . . . . . 151

    Objectives.. . . . . . . . . . . . . . 151

    Practical Deployment of Post-quantum Algorithms. . . . . . 152

    Overcoming Challenges in Quantum-Safe Implementations.. . . . 161

    Scalability and Efficiency in Quantum-Safe Systems. . . . . . 171

    Case Study on PQC and Emerging AI Threats.. . . . . . . 177

    Summary. . . . . . . . . . . . . . 193

    References. . . . . . . . . . . . . . 194

PART IV Defending Against AGI Threats.. . . . . . . . . . 199

Chapter 7 AI-Driven Defenses and Threat Mitigation.. . . . . . . 201

    Objectives.. . . . . . . . . . . . . . 201

    AI and Machine Learning in Cybersecurity.. . . . . . . . 202

    Using AI to Defend Against AI: Generative Adversarial Networks. . . 203

    Generative AI for Cybersecurity: Practical Applications and Code Demonstrations. . 204

    Reinforcement Learning for AGI Threat Mitigation. . . . . . 208

    Case Study on AI and Machine Learning in Cybersecurity: Static Analysis with DeepCode AI (Snyk).. . 210

    Summary. . . . . . . . . . . . . . 222

    References. . . . . . . . . . . . . . 223

Chapter 8 Securing Digital Identities in an AGI World.. . . . . . . 229

    Objectives.. . . . . . . . . . . . . . 229

    Decentralized Digital Identity Systems.. . . . . . . . 230

    Zero-Knowledge Proofs and Homomorphic Encryption. . . . . 233

    Blockchain for Identity Verification.. . . . . . . . . 239

    Case Study: Open-Source Alternatives for AI-Driven Malware Analysis and Threat Detection... . 243

    Summary. . . . . . . . . . . . . . 263

    References. . . . . . . . . . . . . . 264

PART V The Future of Digital Security. . . . . . . . . . 271

Chapter 9 Future-Proofing Digital Security Systems. . . . . . . 273

    Objectives.. . . . . . . . . . . . . . 273

    Preparing for Life Post-Singularity. . . . . . . . . 274

    Roadmap for Quantum and AGI-Safe Infrastructure. . . . . . 276

    Regulatory and Ethical Considerations. . . . . . . . 278

    Case Study: Hybrid Analysis 2.0 for AI Malware Analysis and Enhanced

    Threat Detection. . . . . . . . . . . . . 279

    Summary. . . . . . . . . . . . . . 292

    References. . . . . . . . . . . . . . 293

Chapter 10 Adapting to the Future: Quantum and AGI Security Requirements.. 299

    Objectives.. . . . . . . . . . . . . . 299

    Quantum-Resistant and AGI-Safe Solutions.. . . . . . . 300

    Practical Implementation of Post-Quantum Cryptographic Standards. . 301

    Summary. . . . . . . . . . . . . . 306

    References. . . . . . . . . . . . . . 306

 

9780135435922, TOC, 5/28/25

From the B&N Reads Blog

Customer Reviews