Description |
1 online resource (xviii, 294 pages) : illustrations (chiefly color) |
Series |
--For dummies |
|
--For dummies.
|
Note |
Includes index. |
Contents |
pt. 1. Living securely in the smart world -- pt. 2. Implementing enterprise mobile security -- pt. 3. Securing smart device access -- pt. 4. Securing each smart device -- pt. 5. The part of tens. |
Summary |
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati. |
Subject |
Mobile communication systems -- Security measures.
|
|
Computer security.
|
|
Smartphones.
|
|
Data protection.
|
|
Radiocommunications mobiles -- Sécurité -- Mesures. |
|
Sécurité informatique. |
|
Téléphones intelligents. |
|
Protection de l'information (Informatique) |
|
Computer security. |
|
Mobile computing -- Security measures. |
|
Smartphones. |
|
Computer security |
|
Data protection |
|
Smartphones |
|
Computersicherheit |
|
Datensicherung |
|
Kommunikationssystem |
|
Mobilfunk |
Added Author |
Iyer, Sibbu.
|
|
Krishnan, Ashwin.
|
|
Bauhaus, Mark.
|
Other Form: |
Print version: 9780470927533 |
ISBN |
9781118093795 (electronic bk.) |
|
1118093798 (electronic bk.) |
|
9781118093801 (electronic bk.) |
|
1118093801 (electronic bk.) |
|
9781118093993 (electronic bk.) |
|
1118093992 (electronic bk.) |
|
(pbk. alk. paper) |
|
(pbk. alk. paper) |
Standard No. |
9786613257840 |
|