Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200829 i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr ||||||||||| 
008    171004s2018    nju     ob    001 0 eng   
010      2017047712 
019    1031030120|a1048158922|a1100456230|a1124400949|a1165315967
       |a1166262351|a1167406045|a1371449178 
020    9781119293088|q(pdf) 
020    1119293081 
020    9781119293057|q(epub) 
020    1119293057 
020    9781119293071 
020    1119293073 
020    |q(cloth) 
024 7  10.1002/9781119293071.|2doi 
029 1  CHBIS|b011371132 
029 1  CHNEW|b000979934 
029 1  CHVBK|b507395840 
029 1  CHVBK|b558446094 
035    (OCoLC)1005779670|z(OCoLC)1031030120|z(OCoLC)1048158922
       |z(OCoLC)1100456230|z(OCoLC)1124400949|z(OCoLC)1165315967
       |z(OCoLC)1166262351|z(OCoLC)1167406045|z(OCoLC)1371449178 
037    CL0500000954|bSafari Books Online 
040    DLC|beng|erda|epn|cDLC|dDG1|dN$T|dYDX|dEBLCP|dUPM|dUAB
       |dNLE|dMERER|dRECBK|dUMI|dSTF|dCOO|dUIU|dTOH|dOCLCF|dCEF
       |dKSU|dDEBBG|dDLC|dOCLCQ|dWYU|dG3B|dS9I|dU3W|dVT2|dOCLCQ
       |dUKAHL|dOCLCQ|dHS0|dUWK|dOCLCQ|dIEEEE|dOCLCO|dOCLCQ|dNNQ
       |dOCLCQ|dOCLCO 
042    pcc 
049    INap 
082 00 005.8 
082 00 005.8|223 
099    eBook O'Reilly for Public Libraries 
245 00 Comprehensive guide to 5G security /|cedited by Madhusanka
       Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika 
       Ylianttila.|h[O'Reilly electronic resource] 
264  1 Hoboken, NJ :|bJohn Wiley & Sons,|c2018. 
300    1 online resource 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    data file 
504    Includes bibliographical references and index. 
505 0  The Editors xvii About the Contributors xxi Foreword 
       xxxiii Preface xxxv Acknowledgements xli Part I 5G 
       Security Overview 1 1 Evolution of Cellular Systems 3; 
       Shahriar Shahabuddin, Sadiqur Rahaman, Faisal Rehman, Ijaz
       Ahmad, 
505 0  WiMAX 20 1.6.3 LTE 21 1.6.3.1 Orthogonal Frequency 
       Division Multiplexing (OFDM) 21 1.6.3.2 SC?]FDE and 
       SC?]FDMA 21 1.6.3.3 Multi?]antenna Technique 21 1.6.4 LTE 
       Network Architecture 21 1.7 Fourth Generation Cellular 
       Systems 22 1.7.1 Key Technologies of 4G 23 1.7.1.1 
       Enhanced MINO 23 1.7.1.2 Cooperative Multipoint 
       Transmission and Reception for LTE?]Advanced 23 1.7.1.3 
       Spectrum and Bandwidth Management 24 1.7.1.4 Carrier 
       Aggregation 24 1.7.1.5 Relays 24 1.7.2 Network 
       Architecture 24 1.7.3 Beyond 3G and 4G Cellular Systems 
       Security 25 1.7.4 LTE Security Model 26 1.7.5 Security in 
       WiMAX 26 1.8 Conclusion 27 References 28 2 5G Mobile 
       Networks: Requirements, Enabling Technologies, and 
       Research Activities 31; Van?]Giang Nguyen, Anna Brunstrom,
       Karl?]Johan Grinnemo, 
505 0  Activities 51 2.4.5 IETF Activities 52 2.5 5G Research 
       Communities 52 2.5.1 European 5G Related Activities 52 
       2.5.1.1 5G Research in EU FP7 52 2.5.1.2 5G Research in EU
       H2020 52 2.5.1.3 5G Research in Celtic?]Plus 53 2.5.2 
       Asian 5G Related Activities 53 2.5.2.1 South Korea: 5G 
       Forum 53 2.5.2.2 Japan: 5GMF Forum 54 2.5.2.3 China: 
       IMT?]2020 5G Promotion Group 54 2.5.3 American 5G Related 
       Activities 54 2.6 Conclusion 55 2.7 Acknowledgement 55 
       References 55 3 Mobile Networks Security Landscape 59; 
       Ahmed Bux Abro 3.1 Introduction 59 3.2 Mobile Networks 
       Security Landscape 59 3.2.1 Security Threats and 
       Protection for 1G 61 3.2.2 Security Threats and Protection
       for 2G 61 3.2.3 Security Threats and Protection for 3G 63 
       3.2.4 Security Threats and Protection for 4G 63 3.2.4.1 
       LTE UE (User Equipment) Domain Security 64. 
505 0  3.2.4.2 LTE (Remote Access Network) Domain Security 65 
       3.2.4.3 LTE Core Network Domain Security 65 3.2.4.4 
       Security Threat Analysis for 4G 65 3.2.5 Security Threats 
       and Protection for 5G 66 3.2.5.1 Next Generation Threat 
       Landscape for 5G 68 3.2.5.2 IoT Threat Landscape 68 
       3.2.5.3 5G Evolved Security Model 68 3.2.5.4 5G Security 
       Threat Analysis 69 3.3 Mobile Security Lifecycle Functions
       70 3.3.1 Secure Device Management 71 3.3.2 Mobile OS and 
       App Patch Management 71 3.3.3 Security Threat Analysis and
       Assessment 71 3.3.4 Security Monitoring 72 3.4 Conclusion 
       73 References 73 4 Design Principles for 5G Security 75; 
       Ijaz Ahmad, Madhusanka Liyanage, Shahriar Shahabuddin, 
       Mika Ylianttila, 
505 0  4.4.2 Control Channels Security 89 4.4.3 Traffic 
       Monitoring 91 4.4.4 Access Control 91 4.4.5 Network 
       Resilience 91 4.4.6 Security Systems and Firewalls 92 
       4.4.7 Network Security Automation 92 4.5 Conclusions and 
       Future Directions 94 4.6 Acknowledgement 95 References 95 
       5 Cyber Security Business Models in 5G 99; Julius Francis 
       Gomes, Marika Iivari, Petri Ahokangas, Lauri Isotalo, 
       Bengt Sahlin, 
520    The first comprehensive guide to the design and 
       implementation of security in 5G wireless networks and 
       devices Security models for 3G and 4G networks based on 
       Universal SIM cards worked very well. But they are not 
       fully applicable to the unique security requirements of 5G
       networks. 5G will face additional challenges due to 
       increased user privacy concerns, new trust and service 
       models and requirements to support IoT and mission-
       critical applications. While multiple books already exist 
       on 5G, this is the first to focus exclusively on security 
       for the emerging 5G ecosystem. 5G networks are not only 
       expected to be faster, but provide a backbone for many new
       services, such as IoT and the Industrial Internet. Those 
       services will provide connectivity for everything from 
       autonomous cars and UAVs to remote health monitoring 
       through body-attached sensors, smart logistics through 
       item tracking to remote diagnostics and preventive 
       maintenance of equipment. Most services will be integrated
       with Cloud computing and novel concepts, such as mobile 
       edge computing, which will require smooth and transparent 
       communications between user devices, data centers and 
       operator networks. Featuring contributions from an 
       international team of experts at the forefront of 5G 
       system design and security, this book: -Provides priceless
       insights into the current and future threats to mobile 
       networks and mechanisms to protect it -Covers critical 
       lifecycle functions and stages of 5G security and how to 
       build an effective security architecture for 5G based 
       mobile networks -Addresses mobile network security based 
       on network-centricity, device-centricity, information-
       centricity and people-centricity views -Explores security 
       considerations for all relative stakeholders of mobile 
       networks, including mobile network operators, mobile 
       network virtual operators, mobile users, wireless users, 
       Internet-of things, and cybersecurity experts Providing a 
       comprehensive guide to state-of-the-art in 5G security 
       theory and practice, A Comprehensive Guide to 5G Security 
       is an important working resource for researchers, 
       engineers and business professionals working on 5G 
       development and deployment. 
588 0  Print version record and CIP data provided by publisher. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Mobile communication systems|xSecurity measures. 
650  0 Wireless communication systems|xSecurity measures. 
650  6 Radiocommunications mobiles|xSécurité|xMesures. 
650  6 Transmission sans fil|xSécurité|xMesures. 
650  7 Wireless communication systems|xSecurity measures|2fast 
700 1  Liyanage, Madhusanka,|eeditor. 
700 1  Ahmad, Ijaz,|d1985-|eeditor. 
700 1  Abro, Ahmed Bux,|eeditor. 
700 1  Gurtov, Andrei,|eeditor. 
700 1  Ylianttila, Mika,|eeditor. 
776 08 |iPrint version:|tComprehensive guide to 5G security.
       |dHoboken, NJ : John Wiley & Sons, 2018|z9781119293040
       |w(DLC)  2017040682 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781119293040/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    IEEE|bIEEE|n8341844 
938    Askews and Holts Library Services|bASKH|nAH33507946 
938    EBL - Ebook Library|bEBLB|nEBL5216619 
938    EBSCOhost|bEBSC|n1682279 
938    Recorded Books, LLC|bRECE|nrbeEB00719821 
938    YBP Library Services|bYANK|n15094450 
938    YBP Library Services|bYANK|n15086532 
994    92|bJFN