- 9,336,192 Books
- 84,837,646 Articles
- ZLibrary Home
Main
Securing 5G and Evolving ArchitecturesSecuring 5G and Evolving Architectures
Pramod Nair0 /
0 0 comments
SECURING and EVOLVING ARCHITECTURES
5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G’s openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments.
This coherent, pragmatic, and vendor-agnostic guide will help you plan for security from the outset, make better choices throughout the lifecycle, and develop the mindset needed to secure new generations of networks. You’ll fi nd all you need: from high-level 5G security concepts to in-depth coverage of specific security controls, end-to-end architectural guidance, 5G security use cases, and cutting-edge “quantum proofing.” Throughout, practical examples and real-life scenarios help you apply Nair’s insights―whether you’re a service provider, an enterprise, an industry vertical, a startup, a cybersecurity vendor, a systems integrator, or even in a defense environment.
Securing 5G and Evolving Architectures is for technical and management audiences at all levels of 5G experience--from enterprise and security architects to network engineers, cloud computing and data center professionals, to CSO and CTO teams.
- Explore new 5G security challenges―and why you still need external controls, even with recent 3GPP improvements
- Implement network component security controls for RAN, Transport, 5GC, and devices
- Safeguard Multi-Access Edge Compute (MEC), SDNs, virtualized 5G cores, and massive IOT
- Protect Public and Non-Public Networks (Private 5G) deployment scenarios
- Secure Critical Infrastructure, Vehicle to Everything (V2X), and Smart Factory use cases
- Optimize end-to-end 5G security architecture across all 5G domains based on zero trust
- Prioritize 5G security investments in service provider or enterprise environments
- Preview emerging 5G use cases and ML/AI-based security enhancements
Categories:Computers - NetworkingYear:2021Edition:1Publisher:Addison-Wesley ProfessionalLanguage:EnglishPages:
624 /
806ISBN 10:0137457936File:PDF, 83.47 MB
Download (pdf, 83.47 MB)
Toggle Dropdown Preview Send-to-Kindle or Email
Most frequently terms network
1762deployment
645api
610mec
5705gc
545devices
488deployed
465deployments
458user
447application
410slice
3893gpp
383iot
379functions
365management
360attacks
352authentication
351layer
330applications
323infrastructure
315device
300security controls
292traffic
285software
277securing
270transport
243architecture
241networks
237server
235nfs
231threats
231enterprise
224components
222vulnerabilities
220ddos
218attacker
208service provider
205ensure
199network functions
197orchestration
1965g network
195interface
186sdn
184policy
184service providers
183container
183illustrates
180hardware
176user plane
173network slice
164vendor
157malicious
156users
151packet
145centralized
144vendors
137monitoring
136visibility
134provides
132deploying
131 Post a Review
To post a review, please sign in or sign upYou can write a book review and share your experiences. Other readers will always be interested in your opinion of the books you've read. Whether you've loved the book or not, if you give your honest and detailed thoughts then people will find new books that are right for them.
Free ebooks since 2009. [email protected] FAQ Blog- TOR version">
- Privacy
- DMCA
- English