Vtome.ru - электронная библиотека

Securing 5G and Evolving Architectures (Rough Cuts)

  • Добавил: literator
  • Дата: 8-10-2021, 01:48
  • Комментариев: 0
Securing 5G and Evolving Architectures (Rough Cuts)Название: Securing 5G and Evolving Architectures (Rough Cuts)
Автор: Pramod Nair
Издательство: Addison-Wesley Professional/Pearson Education
Год: 2022
Страниц: 846
Язык: английский
Формат: epub
Размер: 61.6 MB

This practical guide employs real-world use cases and deployment methods to address the threat vectors and mitigation techniques to secure 5G networks. 5G is a disruptive technology not only because it has the potential to support millions of devices at ultrafast speeds, but also because it has the potential to transform the lives of people around the world by improving mission-critical services that affect the safety and security of different services. 5G is susceptible to many of the cybersecurity risks found in today's existing telecom networks but also to new avenues of attack against core network services due to its complex ecosystem of technologies, stakeholders and operations, which include containerized networks, multi-access edge compute (MEC) deployments, services-based architecture, introduction of API interfaces and new use cases catering to enterprise, industrial, health and IoT services. Due to the critical services being provided by 5G and its increased threat surfaces, having a solid security architecture to detect and mitigate these threats is very important.

Security is always an important area, especially as it relates to emerging technologies, but it is often the last aspect to be covered. This book is an essential guide to different deployment methods, threat surfaces based on those deployment scenarios, and methods to mitigate them efficiently. It is also a critical resource for any individual or enterprise (from any industrial sector) planning to evolve towards 5G technology and anyone designing 5G networks because it addresses the security implications up front.

Contents:
Part I: Evolution of Cellular Technologies to 5G: Security Enhancements and Challenges
Chapter 1. Evolution from 4G to 5G
Chapter 2. Deployment Modes in 5G
Chapter 3. Securing 5G Infrastructure
Part II: Securing 5G Architectures, Deployment Modes, and Use Cases”
Chapter 4. Securing RAN and Transport Deployments in 5G
Chapter 5. Securing MEC Deployments in 5G
Chapter 6. Securing Virtualized 5G Core Deployments
Chapter 7. Securing Network Slice, SDN, and Orchestration in 5G
Chapter 8. Securing Massive IoT Deployments in 5G
Chapter 9. Securing 5G Use Cases
Part III: End to End 5G Security Architecture and Prioritizing Security Investments
Chapter 10. Building Pragmatic End-to-End 5G Security Architecture
Chapter 11. Prioritizing 5G Security Investments
Part IV: Emerging Discussions
Chapter 12. 5G and Beyond

Скачать Securing 5G and Evolving Architectures (Rough Cuts)



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.