Securing 5G and evolving architectures:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston
Addison-Wesley
[2022]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xxi, 596 Seiten Illustrationen, Diagramme |
ISBN: | 9780137457939 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047882881 | ||
003 | DE-604 | ||
005 | 20221010 | ||
007 | t | ||
008 | 220315s2022 a||| |||| 00||| eng d | ||
020 | |a 9780137457939 |c pbk |9 978-0-13-745793-9 | ||
035 | |a (OCoLC)1312698399 | ||
035 | |a (DE-599)BVBBV047882881 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-20 |a DE-739 |a DE-862 |a DE-83 | ||
084 | |a ZN 6560 |0 (DE-625)157572: |2 rvk | ||
100 | 1 | |a Nair, Pramod |e Verfasser |0 (DE-588)1255227117 |4 aut | |
245 | 1 | 0 | |a Securing 5G and evolving architectures |c Pramod Nair |
264 | 1 | |a Boston |b Addison-Wesley |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a xxi, 596 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a 5G |0 (DE-588)1188755676 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobilfunkstandard |0 (DE-588)1172778450 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mobilfunkstandard |0 (DE-588)1172778450 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a 5G |0 (DE-588)1188755676 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033265172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033265172 |
Datensatz im Suchindex
DE-BY-862_location | 2000 |
---|---|
DE-BY-FWS_call_number | 2000/ZN 6560 N158 |
DE-BY-FWS_katkey | 1003467 |
DE-BY-FWS_media_number | 083000522432 |
_version_ | 1806177139300499456 |
adam_text | Table of Contents Foreword xiv Preface xv Acknowledgments í About the Author xx xxi Part I Evolution of Cellular Technologies to 5G, Security Enhancements, and Challenges Chapter 1 : Evolution from 4G to 5G 2 Mobile Network Evolution from 4G to 5G....................................................................... 4 5G New Radio Features............................................................................... 5 Disaggregated Architecture......................................................................... 7 Flexible Architecture................................................................................... 10 Service-Based Architecture....................................................................... 12 Adoption of Cloud-Native Technology...................................................... 14 Multi-access Edge Computing (MEG)....................................................... 15 Network Slicing......................................................................... Key 5G Features in 3GPP Releases..................................................................... 16 18 Key 5G Advanced Features........................................................................................... 20 Summary................ ......................................................................................................... 21 Acronym Key......................... 22 References.......................................................................................................................... 24 Chapter 2: Deployment Modes in 5G 26 5G NSA and SA
Deployments.......................................................................................... 27 5G Non-Standalone (NSA) Deployments................................................... 28 5G Standalone (SA) Deployments............................ 31 Network Slice as a Service (NSaaS)........................................................... 40 5G Time-Sensitive Networks........................................ 42 5G Local Area Network-Type Service..............................................................................44 vl Table of Contents
46 Private 5G/Non֊Public Networks....................... Standalone Non-Public Network (SNPN)............................ 46 Public Network Integrated Non-Public Networks (PNI-NPN) . ................ 48 Summary..................................................................................................................... 52 Acronym Key...................................... 52 References................................................................................................................... 54 Chapter 3: Securing 5G Infrastructure 56 3GPP 5G Security Enhancements............................................................................ 57 5G Trust Model: Non-Roaming................................................................57 5G Trust Model: Roaming......................................................................... 59 Integration of Non-3GPP Network to the 5G Core Network................. 59 Other Key Security Enhancements in Release 16...................... 66 Security Challenges in 5G........................................................................................ 74 loT and M2M.......................................................................................... 75 Perimeter-Less Deployments................................................................. 75 Virtualized Deployments........................................................................... 76 Summary............................................................................................................... 77 Acronyms
Key......................................................... 79 References........................................ 80 Part II Securing 5G Architectures, Deployment Modes, and Use Cases Chapter 4: Securing RAN and Transport Deployments in 5G 82 5G RAN and Transport Threats................................................................................... 84 Vulnerabilities in Air Interface................................................................... 84 Vulnerabilities in the Transport Network................................................ 87 Rogue/Fake Base Station Vulnerabilities...................................... 91 Securing 5G RAN and Transport.................................................................... 92 Securing the Air Interface......................................................................... 93 Table of Contents vii
Using Trusted Transport Network Elements............................................. 94 Secure Deployments and Updates Using Secure ZTP.......................... 95 Using Security Gateway (SecGW/SEG) to Secure the RAN and Transport Layer...................................................................... 97 Real Scenario Case Study: Examples of Threat Surfaces and Their Mitigation.... 125 A: The Attacker Takes Control of loT Devices with Weak Security and Launches DDoS Attack................................ 126 B: The Attacker Uses the Vulnerability in S1 and Insecure Transport to Use Rogue eNBs and Uses MitM Attacks in the 5G NSA Deployment............................................. 127 C: The Attacker Uses the Insecure Transport and Carries Out MitM Attacks in Back Haul................................... 128 Mitigation................................................................................................... 128 Summary....................................................................................................................... 136 Acronym Key.......... ....................................................................................................... 138 References..................................................................................................................... 140 Chapter 5: Securing MEC Deployments in 5G 142 Service Provider Network-Based MEC....................................................................... 144 Enterprise Network-Based MEC.................................................................................
145 MEC Deployment Models............................................................................................. 146 Distributed UPF and MEC Application Deployment.............................. 150 C-RAN/O-RAN/Open VRAN Deployment Enabled by MEC................ 151 Enterprise MEC Deployment................................................................... 152 Hybrid MEC Deployment......................................................................... 153 Threat Surfaces in 5G MEC Deployments.................................................................. .154 Physical Security....................................................................................... 155 Hardware and Software Vulnerabilities................................................... 156 5G MEC Infrastructure and Transport Vulnerabilities............................ 159 Virtualization Threat Vectors..................................................................... 164 viii Table of Contents
5G MEC API Vulnerabilities.......................................... 169 DDoS Attacks............................................................................ 174 Securing 5G MEG................................................................................................... 178 Physical Security.................................................................................. 178 Hardening Hardware and Software..................................................... 179 MEG Infrastructure and Transport Security.................................. 183 Securing Virtualized Deployments in 5G MEG.................................... 189 Securing API................................................................................ 198 Validating Both Read and Write Requests............................................ 210 DDoS Protection.................................................................. 212 Real Scenario Case Study: MEC Threats and Their Mitigation................................. 217 Threats: Case Study............................................................................... 219 Mitigation Examples............................................................................... 223 Summary................................................................................................................... 228 Acronym Key................................................................................ 231 References.................................... 233 Chapter 6: Securing Virtualized 5G Core Deployments 234 A Brief Evolution of Virtualization in
Telecommunications........................................ 235 Threats in Virtualized 5G Packet Core Deployments............................ 240 5GC Container Vulnerabilities............................................................... 242 Insecure Container Networking................................................. 245 Container Host and HW Vulnerabilities.................................................. 252 Securing Virtualized 5G Packet Core Deployments.................................................. 257 Secure CI/CD.......................................................................................... 257 Securing 5GC NFs and 5GC NF Traffic.................................................. 265 Securing 5GC NF Orchestration and Access Controls......................... 271 Securing 5GC CNF in Roaming Scenarios............................................ 277 Securing the Host OS and Hardware.................................................... 279 Table of Contents ix
Real Scenario Case Study: Virtualized 5GC Threats and Mitigation........................... 281 Threats Case Study............................................................. 282 Mitigation Examples............................................................................. 285 Summary.......................................................................................................................... 290 Acronym Key.................................................................................................................... 294 References..................................................................................... 296 Chapter 7: Securing Network Slice, SDN, and Orchestration in 5G 298 Network Slicing and Its Enablers—SDN and Orchestration............. ........................ 299 Threat Surfaces in 5G Network Slice, SDN, and Orchestration Deployments........ 309 Threats in the SDN Controller Layer......................................................... 312 Threats in the SDN Data Plane............................................ 316 Threats in Orchestration Layer................................................................... 318 Insufficient Slice-Level Isolation................................................................. 319 Threats in NSaaS Deployments................................................................. 322 Mitigation of Threats.......................................................................................................327 Trusted
Components.................................................................................... 327 Securing Orchestration................................................................................328 Securing the Software-Defined Network (SDN)....................................... 331 Mitigating Data Exfiltration..........................................................................336 Securing Network Slices..............................................................................337 Securing NSaaS Deployments................................................................... 345 Real Scenario Case Study: Threats in the 5G Network Slice, SDN, and Orchestration Deployments and Their Mitigation................................................. 355 Threats: Case Study.................................................................................... 358 Mitigations: Case Study..............................................................................366 Summary.......................................................................................................................... 369 Key Acronyms.................................................................................................................. 372 References........................................................................................................................ 374 x Table of Contents
Chapter 8: Securing Massive loT Deployments in 5G 376 Massive loT-Based Threats in 5G............................................................................. 380 Device Vulnerabilities Due to Weak Built-in Security.......................... 382 Securing mloT Deployments in 5G Networks............................................................ 391 Built-in Hardening of the Device............................................................ 392 Real Scenario Case Study: mloT Threats and Their Mitigation................................. 414 Threats Example.....................................................................................415 Mitigation Example................................................................................. 417 Summary................................................................................................................... 418 Key Acronyms............................................................................................................ 420 References................................................................................................................. 422 Chapter 9: Securing 5G Use Cases 424 Secure 5G Smart Factory and Manufacturing............... ......................................... 425 Threats in 5G Smart Factory Deployments............................................ 429 Securing the 5G Smart Factory..............................................................432 Application-Level Security Controls...................................................... 435 Critical
Infrastructure.................................................................................................. 437 5G Energy Utility.....................................................................................437 Threats in the 5G-Enabled Energy Utility.............................................. 441 Securing 5G-Enabled Energy Utility.......................... 443 447 5G Vehicle-to-Everything (5G-V2X)............................................ Threats in 5G-V2X Deployments............................................................452 Securing 5G-V2X Deployments..............................................................457 Standards and Associations.......................................................................................463 Summary................................................................................................................... 465 Key Acronyms............................................................................................................ 465 References................................................................................................................. 467 Table of Contents xl
Part III End-to-End 5G Security Architecture and Prioritizing Security Investments Chapter 10: Building Pragmatic End-to-End 5G Security Architecture 468 Foundations of 5G Security........................................................................................... 470 Securing 5G and Evolving Network Deployments................................... 471 Securing IT and ОТ..................................................................................... 471 Securing Consumers of 5G and Evolving Technologies......................... 472 Key Tenets of 5G Security Architecture............ ............................................................. 472 Supply Chain Security................................................................................. 473 Securing User and Device Access Using Zero-Trust Principles.......... 474 Secure Intra/lnter-Network Connectivity................................................... 480 Application-Level Security......................................................................... 484 Vulnerability Management and Forensics ................................................. 489 Enhanced Visibility, Monitoring, and Anomaly Detection.........................491 Slice-Level Security..................................................................................... 494 Secure Interoperability............................................................................... 497 Summary..........................................................................................................................497 Acronyms
Key..................................................................................................................498 References..................................................................................................................... 501 Chapter 11 : Prioritizing 5G Security Investments 502 Method of Prioritizing Security Controls....................................................................... 505 Scenario 1....................................................................................................509 Scenario 2....................................................................................................521 Summary....................................................................................................................... 532 Acronyms Key............................................................................................................... 533 References........................................................................................................................ 534 XII Table of Contents
Part IV Emerging Discussions Chapter 12: 5G and Beyond 536 Adoption and Adaptability of 5G and Evolving Technologies..................................... 537 Convergence of Wi-Fi and Evolving Cellular Technologies......................................... 539 Use of Al and ML in Securing 5G and Evolving Networks........................................... 543 Crypto Agility in 5G and Evolving Technologies........................................................... 546 548 Summary........................................ Acronym Key................................................................................................................. 548 References.............. ......................................................................................................... 550 Index 552 Table of Contents xiii
|
adam_txt |
Table of Contents Foreword xiv Preface xv Acknowledgments í About the Author xx xxi Part I Evolution of Cellular Technologies to 5G, Security Enhancements, and Challenges Chapter 1 : Evolution from 4G to 5G 2 Mobile Network Evolution from 4G to 5G. 4 5G New Radio Features. 5 Disaggregated Architecture. 7 Flexible Architecture. 10 Service-Based Architecture. 12 Adoption of Cloud-Native Technology. 14 Multi-access Edge Computing (MEG). 15 Network Slicing. Key 5G Features in 3GPP Releases. 16 18 Key 5G Advanced Features. 20 Summary. . 21 Acronym Key. 22 References. 24 Chapter 2: Deployment Modes in 5G 26 5G NSA and SA
Deployments. 27 5G Non-Standalone (NSA) Deployments. 28 5G Standalone (SA) Deployments. 31 Network Slice as a Service (NSaaS). 40 5G Time-Sensitive Networks. 42 5G Local Area Network-Type Service.44 vl Table of Contents
46 Private 5G/Non֊Public Networks. Standalone Non-Public Network (SNPN). 46 Public Network Integrated Non-Public Networks (PNI-NPN) . . 48 Summary. 52 Acronym Key. 52 References. 54 Chapter 3: Securing 5G Infrastructure 56 3GPP 5G Security Enhancements. 57 5G Trust Model: Non-Roaming.57 5G Trust Model: Roaming. 59 Integration of Non-3GPP Network to the 5G Core Network. 59 Other Key Security Enhancements in Release 16. 66 Security Challenges in 5G. 74 loT and M2M. 75 Perimeter-Less Deployments. 75 Virtualized Deployments. 76 Summary. 77 Acronyms
Key. 79 References. 80 Part II Securing 5G Architectures, Deployment Modes, and Use Cases Chapter 4: Securing RAN and Transport Deployments in 5G 82 5G RAN and Transport Threats. 84 Vulnerabilities in Air Interface. 84 Vulnerabilities in the Transport Network. 87 Rogue/Fake Base Station Vulnerabilities. 91 Securing 5G RAN and Transport. 92 Securing the Air Interface. 93 Table of Contents vii
Using Trusted Transport Network Elements. 94 Secure Deployments and Updates Using Secure ZTP. 95 Using Security Gateway (SecGW/SEG) to Secure the RAN and Transport Layer. 97 Real Scenario Case Study: Examples of Threat Surfaces and Their Mitigation. 125 A: The Attacker Takes Control of loT Devices with Weak Security and Launches DDoS Attack. 126 B: The Attacker Uses the Vulnerability in S1 and Insecure Transport to Use Rogue eNBs and Uses MitM Attacks in the 5G NSA Deployment. 127 C: The Attacker Uses the Insecure Transport and Carries Out MitM Attacks in Back Haul. 128 Mitigation. 128 Summary. 136 Acronym Key. . 138 References. 140 Chapter 5: Securing MEC Deployments in 5G 142 Service Provider Network-Based MEC. 144 Enterprise Network-Based MEC.
145 MEC Deployment Models. 146 Distributed UPF and MEC Application Deployment. 150 C-RAN/O-RAN/Open VRAN Deployment Enabled by MEC. 151 Enterprise MEC Deployment. 152 Hybrid MEC Deployment. 153 Threat Surfaces in 5G MEC Deployments. .154 Physical Security. 155 Hardware and Software Vulnerabilities. 156 5G MEC Infrastructure and Transport Vulnerabilities. 159 Virtualization Threat Vectors. 164 viii Table of Contents
5G MEC API Vulnerabilities. 169 DDoS Attacks. 174 Securing 5G MEG. 178 Physical Security. 178 Hardening Hardware and Software. 179 MEG Infrastructure and Transport Security. 183 Securing Virtualized Deployments in 5G MEG. 189 Securing API. 198 Validating Both Read and Write Requests. 210 DDoS Protection. 212 Real Scenario Case Study: MEC Threats and Their Mitigation. 217 Threats: Case Study. 219 Mitigation Examples. 223 Summary. 228 Acronym Key. 231 References. 233 Chapter 6: Securing Virtualized 5G Core Deployments 234 A Brief Evolution of Virtualization in
Telecommunications. 235 Threats in Virtualized 5G Packet Core Deployments. 240 5GC Container Vulnerabilities. 242 Insecure Container Networking. 245 Container Host and HW Vulnerabilities. 252 Securing Virtualized 5G Packet Core Deployments. 257 Secure CI/CD. 257 Securing 5GC NFs and 5GC NF Traffic. 265 Securing 5GC NF Orchestration and Access Controls. 271 Securing 5GC CNF in Roaming Scenarios. 277 Securing the Host OS and Hardware. 279 Table of Contents ix
Real Scenario Case Study: Virtualized 5GC Threats and Mitigation. 281 Threats Case Study. 282 Mitigation Examples. 285 Summary. 290 Acronym Key. 294 References. 296 Chapter 7: Securing Network Slice, SDN, and Orchestration in 5G 298 Network Slicing and Its Enablers—SDN and Orchestration. . 299 Threat Surfaces in 5G Network Slice, SDN, and Orchestration Deployments. 309 Threats in the SDN Controller Layer. 312 Threats in the SDN Data Plane. 316 Threats in Orchestration Layer. 318 Insufficient Slice-Level Isolation. 319 Threats in NSaaS Deployments. 322 Mitigation of Threats.327 Trusted
Components. 327 Securing Orchestration.328 Securing the Software-Defined Network (SDN). 331 Mitigating Data Exfiltration.336 Securing Network Slices.337 Securing NSaaS Deployments. 345 Real Scenario Case Study: Threats in the 5G Network Slice, SDN, and Orchestration Deployments and Their Mitigation. 355 Threats: Case Study. 358 Mitigations: Case Study.366 Summary. 369 Key Acronyms. 372 References. 374 x Table of Contents
Chapter 8: Securing Massive loT Deployments in 5G 376 Massive loT-Based Threats in 5G. 380 Device Vulnerabilities Due to Weak Built-in Security. 382 Securing mloT Deployments in 5G Networks. 391 Built-in Hardening of the Device. 392 Real Scenario Case Study: mloT Threats and Their Mitigation. 414 Threats Example.415 Mitigation Example. 417 Summary. 418 Key Acronyms. 420 References. 422 Chapter 9: Securing 5G Use Cases 424 Secure 5G Smart Factory and Manufacturing. . 425 Threats in 5G Smart Factory Deployments. 429 Securing the 5G Smart Factory.432 Application-Level Security Controls. 435 Critical
Infrastructure. 437 5G Energy Utility.437 Threats in the 5G-Enabled Energy Utility. 441 Securing 5G-Enabled Energy Utility. 443 447 5G Vehicle-to-Everything (5G-V2X). Threats in 5G-V2X Deployments.452 Securing 5G-V2X Deployments.457 Standards and Associations.463 Summary. 465 Key Acronyms. 465 References. 467 Table of Contents xl
Part III End-to-End 5G Security Architecture and Prioritizing Security Investments Chapter 10: Building Pragmatic End-to-End 5G Security Architecture 468 Foundations of 5G Security. 470 Securing 5G and Evolving Network Deployments. 471 Securing IT and ОТ. 471 Securing Consumers of 5G and Evolving Technologies. 472 Key Tenets of 5G Security Architecture. . 472 Supply Chain Security. 473 Securing User and Device Access Using Zero-Trust Principles. 474 Secure Intra/lnter-Network Connectivity. 480 Application-Level Security. 484 Vulnerability Management and Forensics . 489 Enhanced Visibility, Monitoring, and Anomaly Detection.491 Slice-Level Security. 494 Secure Interoperability. 497 Summary.497 Acronyms
Key.498 References. 501 Chapter 11 : Prioritizing 5G Security Investments 502 Method of Prioritizing Security Controls. 505 Scenario 1.509 Scenario 2.521 Summary. 532 Acronyms Key. 533 References. 534 XII Table of Contents
Part IV Emerging Discussions Chapter 12: 5G and Beyond 536 Adoption and Adaptability of 5G and Evolving Technologies. 537 Convergence of Wi-Fi and Evolving Cellular Technologies. 539 Use of Al and ML in Securing 5G and Evolving Networks. 543 Crypto Agility in 5G and Evolving Technologies. 546 548 Summary. Acronym Key. 548 References. . 550 Index 552 Table of Contents xiii |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Nair, Pramod |
author_GND | (DE-588)1255227117 |
author_facet | Nair, Pramod |
author_role | aut |
author_sort | Nair, Pramod |
author_variant | p n pn |
building | Verbundindex |
bvnumber | BV047882881 |
classification_rvk | ZN 6560 |
ctrlnum | (OCoLC)1312698399 (DE-599)BVBBV047882881 |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
discipline_str_mv | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01494nam a2200373 c 4500</leader><controlfield tag="001">BV047882881</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221010 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220315s2022 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780137457939</subfield><subfield code="c">pbk</subfield><subfield code="9">978-0-13-745793-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312698399</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047882881</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6560</subfield><subfield code="0">(DE-625)157572:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nair, Pramod</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1255227117</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing 5G and evolving architectures</subfield><subfield code="c">Pramod Nair</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 596 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">5G</subfield><subfield code="0">(DE-588)1188755676</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobilfunkstandard</subfield><subfield code="0">(DE-588)1172778450</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobilfunkstandard</subfield><subfield code="0">(DE-588)1172778450</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">5G</subfield><subfield code="0">(DE-588)1188755676</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033265172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033265172</subfield></datafield></record></collection> |
id | DE-604.BV047882881 |
illustrated | Illustrated |
index_date | 2024-07-03T19:23:29Z |
indexdate | 2024-08-01T11:32:27Z |
institution | BVB |
isbn | 9780137457939 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033265172 |
oclc_num | 1312698399 |
open_access_boolean | |
owner | DE-20 DE-739 DE-862 DE-BY-FWS DE-83 |
owner_facet | DE-20 DE-739 DE-862 DE-BY-FWS DE-83 |
physical | xxi, 596 Seiten Illustrationen, Diagramme |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Addison-Wesley |
record_format | marc |
spellingShingle | Nair, Pramod Securing 5G and evolving architectures 5G (DE-588)1188755676 gnd Computersicherheit (DE-588)4274324-2 gnd Mobilfunkstandard (DE-588)1172778450 gnd |
subject_GND | (DE-588)1188755676 (DE-588)4274324-2 (DE-588)1172778450 |
title | Securing 5G and evolving architectures |
title_auth | Securing 5G and evolving architectures |
title_exact_search | Securing 5G and evolving architectures |
title_exact_search_txtP | Securing 5G and evolving architectures |
title_full | Securing 5G and evolving architectures Pramod Nair |
title_fullStr | Securing 5G and evolving architectures Pramod Nair |
title_full_unstemmed | Securing 5G and evolving architectures Pramod Nair |
title_short | Securing 5G and evolving architectures |
title_sort | securing 5g and evolving architectures |
topic | 5G (DE-588)1188755676 gnd Computersicherheit (DE-588)4274324-2 gnd Mobilfunkstandard (DE-588)1172778450 gnd |
topic_facet | 5G Computersicherheit Mobilfunkstandard |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033265172&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT nairpramod securing5gandevolvingarchitectures |
Inhaltsverzeichnis
THWS Schweinfurt Zentralbibliothek Lesesaal
Signatur: |
2000 ZN 6560 N158 |
---|---|
Exemplar 1 | ausleihbar Verfügbar Bestellen |