Search Books
Cyber-Physical System Desig… Critical Issues Series - Cy…

Mobile Security: A Pocket Guide (Softcover)

Author Steven Furnell
Publisher IT Governance Publishing
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
13.46 14.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $42.38

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN1849280207
ISBN-139781849280204
AvailabilityUsually ships in 24 hours
Sales Rank4,303,145
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Mobile devices represent an increasingly important proportion of the technology market, with laptops, PDAs and smartphones all offering substantial opportunities to improve personal communications and business flexibility. In addition, removable storage, such as memory sticks, now enables enormous quantities of data to be carried around, making it available to use on demand in any location. However, such undoubted advantages can also bring considerable risks, with devices being physically vulnerable to loss, theft and damage, as well as potentially exposed to various forms of electronic attack. As such, there is a significant and growing need for protection, in order to enable us to get the best out of the kit in an otherwise dangerous digital world. The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organizations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems. The content is essentially applicable to anyone using and deploying mobile devices, but particularly relevant to those wanting guidance on why protection is required and what should be done to achieve it (while at the same time noting that it is not a detailed how-to guide for any particular technology platform). In addition to the main discussion and evidence, each chapter concludes with a series of takeaways that summarize the key messages, and can be used as high-level reminders of the points that we need to remember.
How to be an IT Administrator: By Robert McMillen
View
Advanced Networking Concepts Applied Using Linux on IB…
View
Perl Best Practices: Standards and Styles for Developi…
View
Distributed .NET Programming in VB .NET
View
Introduction to Biometrics
View
Mathematical Foundations of Programming Semantics: 5th…
View
Geometric Analysis and Computer Graphics: Proceedings …
View
WordPerfect 6.0 for Windows : Quick Course
View