๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Securing 5g and Evolving Architectures

โœ Scribed by Pramod Nair


Publisher
Addison-Wesley Professional
Year
2021
Tongue
English
Leaves
504
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This practical guide employs real-world use cases and deployment methods to address the threat vectors and mitigation techniques to secure 5G networks. 5G is a disruptive technology not only because it has the potential to support millions of devices at ultrafast speeds, but also because it has the potential to transform the lives of people around the world by improving mission-critical services that affect the safety and security of different services. 5G is susceptible to many of the cybersecurity risks found in today's existing telecom networks but also to new avenues of attack against core network services due to its complex ecosystem of technologies, stakeholders and operations, which include containerized networks, multi-access edge compute (MEC) deployments, services-based architecture, introduction of API interfaces and new use cases catering to enterprise, industrial, health and IoT services. Due to the critical services being provided by 5G and its increased threat surfaces, having a solid security architecture to detect and mitigate these threats is very important.

Security is always an important area, especially as it relates to emerging technologies, but it is often the last aspect to be covered. This book is an essential guide to different deployment methods, threat surfaces based on those deployment scenarios, and methods to mitigate them efficiently. It is also a critical resource for any individual or enterprise (from any industrial sector) planning to evolve towards 5G technology and anyone designing 5G networks because it addresses the security implications up front.


๐Ÿ“œ SIMILAR VOLUMES


Securing 5G and Evolving Architectures
โœ Pramod Nair ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

<p><b>SECURING and EVOLVING ARCHITECTURES</b></p> <p><br></p> <p><br></p> <p>5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5Gโ€™s openness, a new deve

From 5G to 6G: Technologies, Architectur
โœ Abdulrahman Yarali ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Wiley ๐ŸŒ English

From 5G to 6G Understand the transition to the sixth generation of wireless with this bold introduction The transition from the fifth generation of wireless communication (5G) to the coming sixth generation (6G) promises to be one of the most significant phases in the history of telecommunicat

From 5G to 6G: Technologies, Architectur
โœ Abdulrahman Yarali ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Wiley-IEEE Press ๐ŸŒ English

<span>From 5G to 6G</span><p><span>Understand the transition to the sixth generation of wireless with this bold introduction</span></p><p><span>The transition from the fifth generation of wireless communication (5G) to the coming sixth generation (6G) promises to be one of the most significant phase

Security Issues in Fog Computing from 5G
โœ Chintan Bhatt, Yulei Wu, Saad Harous, Massimo Villari ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of f