買這商品的人也買了...
-
$1,872Deep Learning: A Practitioner's Approach (Paperback) -
使用者故事對照 (User Story Mapping: Discover the Whole Story, Build the Right Product)$580$458 -
建構微服務|設計細微化的系統 (Building Microservices)$580$458 -
打動人心的產品設計|頂尖設計師打造成功產品的黃金法則 (Designing Products People Love: How Great Designers Create Successful Products)$580$458 -
高品質微服務|建構跨工程組織的標準化系統 (Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization)$450$356 -
$2,276IoT Hackers Handbook: An Ultimate Guide to Hacking the Internet of Things and Learning IoT Security -
Key Technologies for 5G Wireless Systems (Hardcover)$1,750$1,715 -
5G System Design: Architectural and Functional Considerations and Long Term Research$4,980$4,731 -
提升程式設計師的面試力|189道面試題目與解答, 6/e (Cracking the Coding Interview : 189 Programming Questions and Solutions, 6/e)$880$695 -
實戰 Firebase|APP 開發者的最佳雲端服務平台$400$340 -
$4655G 移動通信系統及關鍵技術 -
領域驅動設計:軟體核心複雜度的解決方法 (Domain-Driven Design: Tackling Complexity in the Heart of Software)$680$530 -
分散式系統設計 (Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services)$480$379 -
圖解資訊安全與個資保護|網路時代人人要懂的自保術$380$323 -
$2,432BPF Performance Tools : Linux System and Application Observability (Paperback) -
$1,584Microservices Security in Action -
Go語言高併發與微服務實戰$534$507 -
深入淺出 Go (Head First Go)$880$695 -
Systems Performance, 2/e (Paperback)$2,550$2,423 -
$1,188CISSP 權威指南, 8/e (CISSP All-in-One Exam Guide, 8/e) -
無卡無現金時代:網路支付業務規劃設計及實作$690$545 -
$505DevSecOps 實戰 -
The Hacker Playbook 3 中文版:滲透測試實戰 (紅隊版)$650$507 -
CYBERSEC 2022 臺灣資安年鑑 ─ 零信任資安時代來臨:信任邊界徹底瓦解,安全需源自反覆驗證$179$161 -
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Paperback)$3,600$3,420
商品描述
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices
Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.
5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.
Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:
- Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
- Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
- Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
- Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
商品描述(中文翻譯)
首部全面指南:5G無線網路與設備的安全設計與實作
基於通用SIM卡的3G和4G網路安全模型運作良好,但這些模型並不完全適用於5G網路獨特的安全需求。5G將面臨額外的挑戰,包括用戶隱私問題的增加、新的信任和服務模型,以及支持物聯網(IoT)和關鍵任務應用的需求。雖然已有多本書籍探討5G,但這是首本專注於新興5G生態系統安全的書籍。
5G網路不僅預期會更快,還將為許多新服務提供基礎設施,例如物聯網和工業互聯網。這些服務將為從自駕車和無人機到通過身體附著感測器進行的遠程健康監測、通過物品追蹤實現的智慧物流,以及設備的遠程診斷和預防性維護等各種應用提供連接。大多數服務將與雲計算和新穎概念(如移動邊緣計算)整合,這將需要用戶設備、數據中心和運營商網路之間的順暢和透明的通信。
本書匯集了國際專家團隊在5G系統設計和安全領域的貢獻:
- 提供對移動網路當前和未來威脅及其保護機制的寶貴見解
- 涵蓋5G安全的關鍵生命周期功能和階段,以及如何為基於5G的移動網路構建有效的安全架構
- 基於網路中心、設備中心、資訊中心和人員中心的觀點,探討移動網路安全
- 考慮所有相關利益相關者的安全問題,包括移動網路運營商、移動網路虛擬運營商、移動用戶、無線用戶、物聯網及網路安全專家
作為5G安全理論與實踐的全面指南,A Comprehensive Guide to 5G Security 是研究人員、工程師和商業專業人士在5G開發和部署過程中的重要工作資源。
