Security for Telecommunications Networks Security for Telecommunications Networks
Advances in Information Security

Security for Telecommunications Networks

Patrick Traynor and Others
    • $139.99
    • $139.99

Publisher Description

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.

Given the significant focus on securing critical infrastructure in recent years, Security for Telecommunications Networks creates a starting place for new researchers in the field of secure telecommunications networks. This volume not only discusses emerging threats, along with system vulnerability, but also presents the open questions posited by network evolution and defense mechanisms. This is one of the first books to discuss securing current and next generation telecommunications networks by the security community.

Security for Telecommunications Networks is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable as a secondary text book or reference for advanced-level students in computer science and electrical engineering.

GENRE
Computers & Internet
RELEASED
2008
July 12
LANGUAGE
EN
English
LENGTH
192
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
5.2
MB
VoIP Security VoIP Security
2005
Wireless Network Security Wireless Network Security
2018
Next-Generation Wireless Technologies Next-Generation Wireless Technologies
2013
How to Cheat at VoIP Security How to Cheat at VoIP Security
2011
Wireless Security Wireless Security
2001
Mobile Networks and Management Mobile Networks and Management
2017
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
2023