68,95 €
68,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
34 °P sammeln
68,95 €
68,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
34 °P sammeln
Als Download kaufen
68,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
34 °P sammeln
Jetzt verschenken
68,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
34 °P sammeln
  • Format: PDF

Each day, more than two billion people across the globe rely upon telecommunications networks systems as their primary means of connecting to the world around them. This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense…mehr

Produktbeschreibung
Each day, more than two billion people across the globe rely upon telecommunications networks systems as their primary means of connecting to the world around them. This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Each day, more than two billion people across the globe rely upon telecommunications networks systems as their primary means of connecting to the world around them. This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.
Rezensionen
From the reviews: "In this book, Traynor et al. reveal some of the vulnerabilities of mobile telephony, and briefly show its foundations in a clear and didactic way. Although average readers could easily understand the initial chapters, readers literate in computers and networks are the intended audience of the book. ... this is a very interesting book, full of valuable content. I would recommend it to everyone interested in the secrets of cellular telephony." (Agusti Solanas, ACM Computing Reviews, January, 2009) "This book identifies network security problems and vulnerabilities, their underlying causes, and some of their consequences and solutions. ... It addresses the security concerns in cellular networks, which seem to be the most rapidly growing segment of communications throughout the world, especially in fast-growing countries such as Brazil, Russia, India, and China. ... The book will be useful to network engineers, analysts, designers, and researchers interested in investigating cellular network security issues in detail." (Satya Prakash Saraswat, ACM Computing Reviews, October, 2008)