Cargando…

Mobile device security for dummies

The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a...

Descripción completa

Detalles Bibliográficos
Autores principales: Campagna, Rich, Iyer, Subbu, Krishnan, Ashwin
Lenguaje:eng
Publicado: Wiley 2011
Materias:
Acceso en línea:http://cds.cern.ch/record/1613169
_version_ 1780932263467286528
author Campagna, Rich
Iyer, Subbu
Krishnan, Ashwin
author_facet Campagna, Rich
Iyer, Subbu
Krishnan, Ashwin
author_sort Campagna, Rich
collection CERN
description The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati
id cern-1613169
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2011
publisher Wiley
record_format invenio
spelling cern-16131692021-04-21T22:11:18Zhttp://cds.cern.ch/record/1613169engCampagna, RichIyer, SubbuKrishnan, AshwinMobile device security for dummiesComputing and ComputersThe information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informatiWileyoai:cds.cern.ch:16131692011
spellingShingle Computing and Computers
Campagna, Rich
Iyer, Subbu
Krishnan, Ashwin
Mobile device security for dummies
title Mobile device security for dummies
title_full Mobile device security for dummies
title_fullStr Mobile device security for dummies
title_full_unstemmed Mobile device security for dummies
title_short Mobile device security for dummies
title_sort mobile device security for dummies
topic Computing and Computers
url http://cds.cern.ch/record/1613169
work_keys_str_mv AT campagnarich mobiledevicesecurityfordummies
AT iyersubbu mobiledevicesecurityfordummies
AT krishnanashwin mobiledevicesecurityfordummies