The Wiley 5G REF (Record no. 7859)

MARC details
000 -LEADER
fixed length control field 02580cam a22002418i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251225100110.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210727s2021 nju ob 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119820338
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119820321
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.3845/6
245 14 - TITLE STATEMENT
Title The Wiley 5G REF
Statement of responsibility, etc editors-in-chief, Rahim Tafazolli, University of Surrey, UK, Chin-Liang Wang, National Tsing Hua University, Taiwan, R.O.C., Periklis Chatzimisios, International Hellenic University, Greece ; with foreword by Madhusanka Liyanage, University College Dublin, Ireland.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity
Year of publication ©2021.
520 ## - SUMMARY, ETC.
Summary, etc "From the Section Editor's Foreword by Dr. Madhusanka Liyanage, University College Dublin, Ireland. The Wiley 5G Ref: Security offers a stellar collection of articles selected from the online-only work, The Wiley 5G Reference. It aims to provide a solid educational foundation for researchers and practitioners in the field of 5G Security and Privacy to expand their knowledge base by including the latest developments in these disciplines. The book introduces the security landscape of 5G, and significant security and privacy risks associated with the 5G networks. Then, the security solutions for different segments of the 5G network, i.e., radio network, edge network, access network, and core network, are discussed. Since 5G is developed based on network softwarization, security threats associated with key network softwarization technologies such as SDN, NFV, NS, and MEC are also presented in detail. Then, the security issues related to the new 5G and IoT services are delivered. Finally, a detailed discussion on the privacy of 5G networks is presented by considering Datafied Society. Written by leading experts in security and privacy for the telecommunication network, this book is intended to provide additional learning opportunities for a wide range of readers, from graduate-level students to seasoned engineering professionals. We are confident that this book and the entire collection of selected articles will continue Wiley's tradition of excellence in technical publishing and provide a lasting and positive contribution to the teaching and practice of security and privacy of 5G and beyond networks"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term 5G mobile communication systems
General subdivision Security measures
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tafazolli, Rahim
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wang, Chin-Liang
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chatzimisios, Periklis
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liyanage, Madhusanka
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=10013930
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books
Holdings
Withdrawn status Lost status Damaged status Home library Current library Date acquired Full call number Accession Number Bill Date/Price effective from Koha item type
      Indian Institute of Technology Tirupati Indian Institute of Technology Tirupati 24/12/2025 621.3845/6 EB00827 24/12/2025 E-Books