買這商品的人也買了...
-
$352低功耗藍牙開發權威指南
-
$1,872Deep Learning: A Practitioner's Approach (Paperback)
-
$580$458 -
$580$458 -
$580$458 -
$450$356 -
$2,276$2,230 -
$1,750$1,715 -
$4,200$3,990 -
$880$695 -
$400$340 -
$4655G 移動通信系統及關鍵技術
-
$680$530 -
$480$408 -
$380$323 -
$2,565BPF Performance Tools : Linux System and Application Observability (Paperback)
-
$1,980$1,881 -
$534$507 -
$880$695 -
$2,700$2,565 -
$1,010CISSP 權威指南, 8/e (CISSP All-in-One Exam Guide, 8/e)
-
$690$545 -
$505DevSecOps 實戰
-
$650$507 -
$179$161
相關主題
商品描述
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices
Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.
5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.
Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:
- Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
- Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
- Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
- Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
商品描述(中文翻譯)
首本關於設計和實施5G無線網絡和設備安全的全面指南
基於通用SIM卡的3G和4G網絡的安全模型運作得非常好。但它們並不完全適用於5G網絡的獨特安全需求。由於用戶隱私關注的增加、新的信任和服務模型以及支持物聯網和關鍵應用的需求,5G將面臨額外的挑戰。儘管已經有多本關於5G的書籍存在,但這是首本專門關注新興5G生態系統安全的書籍。
5G網絡不僅預計速度更快,還將為許多新服務提供支撐,例如物聯網和工業互聯網。這些服務將為從自動駕駛汽車和無人機到通過身體附著式感應器進行遠程健康監測、通過物品追踪進行智能物流、遠程診斷和預防性維護設備提供連接。大多數服務將與雲計算和新概念(例如移動邊緣計算)集成,這將需要用戶設備、數據中心和運營商網絡之間的順暢和透明通信。
本書由國際領先的5G系統設計和安全專家團隊提供,包括以下內容:
- 提供對移動網絡當前和未來威脅的寶貴見解,以及保護其的機制
- 涵蓋5G安全的關鍵生命周期功能和階段,以及如何為基於5G的移動網絡構建有效的安全架構
- 從網絡中心性、設備中心性、信息中心性和人員中心性的觀點探討移動網絡安全
- 探討移動網絡相關利益相關者的安全考慮,包括移動網絡運營商、移動網絡虛擬運營商、移動用戶、無線用戶、物聯網和網絡安全專家
作為5G安全理論和實踐的全面指南,《5G安全全面指南》是研究人員、工程師和從事5G開發和部署的商業專業人士的重要工作資源。