Cargando…
Mobile device security for dummies
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a...
Autores principales: | , , |
---|---|
Lenguaje: | eng |
Publicado: |
Wiley
2011
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1613169 |
_version_ | 1780932263467286528 |
---|---|
author | Campagna, Rich Iyer, Subbu Krishnan, Ashwin |
author_facet | Campagna, Rich Iyer, Subbu Krishnan, Ashwin |
author_sort | Campagna, Rich |
collection | CERN |
description | The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati |
id | cern-1613169 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2011 |
publisher | Wiley |
record_format | invenio |
spelling | cern-16131692021-04-21T22:11:18Zhttp://cds.cern.ch/record/1613169engCampagna, RichIyer, SubbuKrishnan, AshwinMobile device security for dummiesComputing and ComputersThe information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informatiWileyoai:cds.cern.ch:16131692011 |
spellingShingle | Computing and Computers Campagna, Rich Iyer, Subbu Krishnan, Ashwin Mobile device security for dummies |
title | Mobile device security for dummies |
title_full | Mobile device security for dummies |
title_fullStr | Mobile device security for dummies |
title_full_unstemmed | Mobile device security for dummies |
title_short | Mobile device security for dummies |
title_sort | mobile device security for dummies |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1613169 |
work_keys_str_mv | AT campagnarich mobiledevicesecurityfordummies AT iyersubbu mobiledevicesecurityfordummies AT krishnanashwin mobiledevicesecurityfordummies |