Bookshelf
| can't find it |

| browse books |
books
 

| book details |

A Comprehensive Guide to 5G Security

Edited by Madhusanka Liyanage, Edited by Ijaz Ahmad, Edited by Ahmed Bux Abro, Edited by Andrei Gurtov, Edited by Mika Ylianttila





This book is currently unavailable. Enquire to check if we can source a used copy


| book description |

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices  Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.

| product details |



Normally shipped | Enquiries only
Publisher | John Wiley & Sons Inc
Published date | 8 Jan 2018
Language |
Format | Digital (delivered electronically)
Pages | 480
Dimensions | 0 x 0 x 0mm (L x W x H)
Weight | 0g
ISBN | 978-1-1192-9305-7
Readership Age |
BISAC | technology / telecommunications


| other options |


| your trolley |

To view the items in your trolley please sign in.

| sign in |

| specials |

Fifteen Dogs

André Alexis
Paperback / softback
176 pages
was: R 280.95
now: R 252.95
Available from overseas. Dispatched in aprox 4-8 weeks as local supplier is out of stock

A pack of dogs are granted the power of human thought - but what will it do to them? A surprising and insightful look at the beauty and perils of consciousness.

The Ballerina and the Bull: Anarchist Utopias in the Age of Finance

Johanna Isaacson
Paperback / softback
288 pages
was: R 306.95
now: R 275.95
This title will take longer to obtain, and should be delivered in 6-8 weeks

Our moment has seen the resurgence of an anarchist sensibility, from the uprisings in Seattle in 1999 to the Occupy movement of 2011.

Bonsai Success in Southern Africa

Carl Morrow
Paperback / softback
160 pages
was: R 320.95
now: R 288.95
Stock is usually dispatched in 6-12 days from date of order

In this uniquely Southern African book, Carl Morrow and Keith Kirsten guide readers step by step into the magical realms of bonsai as a hobby, horticultural practice and art form.