Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Comprehensive Guide to 5G Security, Liyanage


Варианты приобретения
Цена: 18050.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Liyanage
Название:  Comprehensive Guide to 5G Security
ISBN: 9781119293040
Издательство: Wiley
Классификация:

ISBN-10: 1119293049
Обложка/Формат: Hardback
Страницы: 474
Вес: 1.17 кг.
Дата издания: 09.03.2018
Серия: Electronics & communications engineering
Язык: English
Размер: 178 x 250 x 33
Читательская аудитория: Professional & vocational
Ключевые слова: Electronics & communications engineering
Основная тема: Communication System Security
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание:

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices

Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.

5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.

Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:

  • Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
  • Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
  • Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
  • Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.



The Art of Deception: Controlling the Human Element of Security

Автор: Kevin D. Mitnick
Название: The Art of Deception: Controlling the Human Element of Security
ISBN: 076454280X ISBN-13(EAN): 9780764542800
Издательство: Wiley
Рейтинг:
Цена: 1584.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.

Security for Web Developers: Using JavaScript, HTML, and CSS

Автор: Mueller John Paul
Название: Security for Web Developers: Using JavaScript, HTML, and CSS
ISBN: 1491928646 ISBN-13(EAN): 9781491928646
Издательство: Wiley
Рейтинг:
Цена: 6334.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices.

Identity and Data Security for Web Development: Best Practices

Автор: LeBlanc Jonathan, Messerschmidt Tim
Название: Identity and Data Security for Web Development: Best Practices
ISBN: 1491937017 ISBN-13(EAN): 9781491937013
Издательство: Wiley
Рейтинг:
Цена: 5067.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: With this practical guide, you`ll learn how and why everyone working on a system needs to ensure that users and data are protected. The authors provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity-without compromising usability.

Embedded Systems Security,

Автор: David Kleidermacher
Название: Embedded Systems Security,
ISBN: 0123868866 ISBN-13(EAN): 9780123868862
Издательство: Elsevier Science
Рейтинг:
Цена: 8083.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The ultimate resource for making embedded systems reliable, safe, and secure. . Embedded Systems Security provides:. . . A broad understanding of security principles, concerns, and technologies. . . Proven techniques for the efficient development of safe and secure embedded software. . . A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems. . . Nuggets of practical advice and numerous case studies throughout. . . Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world’s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems. . This book is indispensable for embedded systems and security professionals, new and experienced. . An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market. . . Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group. . . Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology. . . Adriel Desautels, President and CTO, Netragard, LLC. . . Security of embedded

Unmasking the Social Engineer: The Human Element of Security

Автор: Hadnagy Christopher
Название: Unmasking the Social Engineer: The Human Element of Security
ISBN: 1118608577 ISBN-13(EAN): 9781118608579
Издательство: Wiley
Рейтинг:
Цена: 4435.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets.

Network security with openssl

Автор: Viega, Jon Messier, Matt Chandra, Pravir
Название: Network security with openssl
ISBN: 059600270X ISBN-13(EAN): 9780596002701
Издательство: Wiley
Рейтинг:
Цена: 5067.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This volume is designed to enable developers to use The OpenSSL library more effectively. It offers guidance on avoiding pitfalls, while taking advantage of the library`s advanced features and provides the information necessary to use OpenSSL safely and effectively.

Oracle Database 12c Security

Автор: Knox David, Maroulis William, Gaetjen Scott
Название: Oracle Database 12c Security
ISBN: 0071824286 ISBN-13(EAN): 9780071824286
Издательство: McGraw-Hill
Рейтинг:
Цена: 13211.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Renowned Oracle security expert David Knox provides trusted advice and best practices for comprehensive Oracle Database security. Key capabilities from the five major database releases with a sustained focus on the newest release are provided. Code samples and design templates implemented by top Oracle Database security architects are included.

Information Security Risk Assessment Toolkit,

Автор: Mark Talabis
Название: Information Security Risk Assessment Toolkit,
ISBN: 1597497355 ISBN-13(EAN): 9781597497350
Издательство: Elsevier Science
Рейтинг:
Цена: 6736.00 р.
Наличие на складе: Поставка под заказ.

Описание: Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment.

Building a Comprehensive IT Security Program

Автор: Wittkop
Название: Building a Comprehensive IT Security Program
ISBN: 1484220528 ISBN-13(EAN): 9781484220528
Издательство: Springer
Рейтинг:
Цена: 5170.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless.Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope.Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security.Jeremy Wittkop’s security expertise and critical experience provides insights into topics such as:Who is attempting to steal information and why?What are critical information assets?How are effective programs built?How is stolen information capitalized?How do we shift the paradigm to better protect our organizations?How we can make the cyber world safer for everyone to do business?

Applied Network Security Monitoring,

Автор: Chris Sanders
Название: Applied Network Security Monitoring,
ISBN: 0124172083 ISBN-13(EAN): 9780124172081
Издательство: Elsevier Science
Рейтинг:
Цена: 6736.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия