A Comprehensive Guide to 5G Security
- Indbinding:
- Hardback
- Sideantal:
- 480
- Udgivet:
- 9. marts 2018
- Størrelse:
- 250x178x33 mm.
- Vægt:
- 868 g.
- 8-11 hverdage.
- 9. december 2024
Normalpris
Abonnementspris
- Rabat på køb af fysiske bøger
- 1 valgfrit digitalt ugeblad
- 20 timers lytning og læsning
- Adgang til 70.000+ titler
- Ingen binding
Abonnementet koster 75 kr./md.
Ingen binding og kan opsiges når som helst.
- 1 valgfrit digitalt ugeblad
- 20 timers lytning og læsning
- Adgang til 70.000+ titler
- Ingen binding
Abonnementet koster 75 kr./md.
Ingen binding og kan opsiges når som helst.
Beskrivelse af A Comprehensive Guide to 5G Security
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices
Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and missionΓÇôcritical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.
5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through bodyΓÇôattached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.
Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:
Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks Addresses mobile network security based on networkΓÇôcentricity, deviceΓÇôcentricity, informationΓÇôcentricity and peopleΓÇôcentricity views Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, InternetΓÇôof things, and cybersecurity experts Providing a comprehensive guide to stateΓÇôofΓÇôtheΓÇôart in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and missionΓÇôcritical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.
5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through bodyΓÇôattached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.
Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:
Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks Addresses mobile network security based on networkΓÇôcentricity, deviceΓÇôcentricity, informationΓÇôcentricity and peopleΓÇôcentricity views Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, InternetΓÇôof things, and cybersecurity experts Providing a comprehensive guide to stateΓÇôofΓÇôtheΓÇôart in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Brugerbedømmelser af A Comprehensive Guide to 5G Security
Giv din bedømmelse
For at bedømme denne bog, skal du være logget ind.Andre købte også..
Find lignende bøger
Bogen A Comprehensive Guide to 5G Security findes i følgende kategorier:
© 2024 Pling BØGER Registered company number: DK43351621