Cargando…

Securing 5G and Evolving Architectures /

This practical guide employs real-world use cases and deployment methods to address the threat vectors and mitigation techniques to secure 5G networks. 5G is a disruptive technology not only because it has the potential to support millions of devices at ultrafast speeds, but also because it has the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Nair, Pramod (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Addison-Wesley Professional, 2021.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1281680680
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 071021s2021 xx go 000 0 eng d
040 |a TOH  |b eng  |e pn  |c TOH  |d AU@  |d YDX  |d OCLCO  |d ORMDA  |d OCLCO  |d OCLCF  |d UKAHL  |d OCLCQ  |d TOH  |d OCLCQ  |d OCLCO 
019 |a 1277510107  |a 1291170695  |a 1291229929  |a 1291268152  |a 1291289132  |a 1291311402 
020 |a 9780137458097 
020 |a 0137458096 
020 |a 0137458045  |q (electronic bk.) 
020 |a 9780137458042  |q (electronic bk.) 
020 |z 9780137457939 
024 8 |a 9780137458097 
029 1 |a AU@  |b 000070045907 
035 |a (OCoLC)1281680680  |z (OCoLC)1277510107  |z (OCoLC)1291170695  |z (OCoLC)1291229929  |z (OCoLC)1291268152  |z (OCoLC)1291289132  |z (OCoLC)1291311402 
037 |a 9780137458097  |b O'Reilly Media 
050 4 |a TK5103.25 
082 0 4 |a 384.5  |2 23 
049 |a UAMI 
100 1 |a Nair, Pramod,  |e author. 
245 1 0 |a Securing 5G and Evolving Architectures /  |c Nair, Pramod. 
250 |a 1st edition. 
264 1 |b Addison-Wesley Professional,  |c 2021. 
300 |a 1 online resource (504 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 69.99 
520 |a This practical guide employs real-world use cases and deployment methods to address the threat vectors and mitigation techniques to secure 5G networks. 5G is a disruptive technology not only because it has the potential to support millions of devices at ultrafast speeds, but also because it has the potential to transform the lives of people around the world by improving mission-critical services that affect the safety and security of different services. 5G is susceptible to many of the cybersecurity risks found in today's existing telecom networks but also to new avenues of attack against core network services due to its complex ecosystem of technologies, stakeholders and operations, which include containerized networks, multi-access edge compute (MEC) deployments, services-based architecture, introduction of API interfaces and new use cases catering to enterprise, industrial, health and IoT services. Due to the critical services being provided by 5G and its increased threat surfaces, having a solid security architecture to detect and mitigate these threats is very important. Security is always an important area, especially as it relates to emerging technologies, but it is often the last aspect to be covered. This book is an essential guide to different deployment methods, threat surfaces based on those deployment scenarios, and methods to mitigate them efficiently. It is also a critical resource for any individual or enterprise (from any industrial sector) planning to evolve towards 5G technology and anyone designing 5G networks because it addresses the security implications up front. 
542 |f Copyright © Addison-Wesley Professional 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title page (viewed December 22, 2021). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a 5G mobile communication systems. 
650 6 |a Communications mobiles 5G. 
650 7 |a 5G mobile communication systems  |2 fast 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780137458097/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39674983 
938 |a YBP Library Services  |b YANK  |n 17874855 
938 |a YBP Library Services  |b YANK  |n 17783481 
994 |a 92  |b IZTAP