From the reviews:
"In this book, Traynor et al. reveal some of the vulnerabilities of mobile telephony, and briefly show its foundations in a clear and didactic way. Although average readers could easily understand the initial chapters, readers literate in computers and networks are the intended audience of the book. … this is a very interesting book, full of valuable content. I would recommend it to everyone interested in the secrets of cellular telephony." (Agusti Solanas, ACM Computing Reviews, January, 2009)
"This book identifies network security problems and vulnerabilities, their underlying causes, and some of their consequences and solutions. … It addresses the security concerns in cellular networks, which seem to be the most rapidly growing segment of communications throughout the world, especially in fast-growing countries such as Brazil, Russia, India, and China. … The book will be useful to network engineers, analysts, designers, and researchers interested in investigating cellular network security issues in detail." (Satya Prakash Saraswat, ACM Computing Reviews, October, 2008)
From the Back Cover
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.
Given the significant focus on securing critical infrastructure in recent years, Security for Telecommunications Networks creates a starting place for new researchers in the field of secure telecommunications networks. This volume not only discusses emerging threats, along with system vulnerability, but also presents the open questions posited by network evolution and defense mechanisms. This is one of the first books to discuss securing current and next generation telecommunications networks by the security community.
Security for Telecommunications Networks is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable as a secondary text book or reference for advanced-level students in computer science and electrical engineering.