|
|
|
|
| LEADER |
00000cam a2200000 7i4500 |
| 001 |
0000073976 |
| 005 |
20120102.0 |
| 008 |
110616s2010 flu eng |
| 020 |
|
|
|a 1439820163 (paperback : alk. paper)
|
| 020 |
|
|
|a 9781439820162 (paperback : alk. paper)
|
| 050 |
0 |
0 |
|a HF5548.37
|b .F75 2010
|
| 090 |
0 |
0 |
|a HF5548.37
|b .F75 2010
|
| 100 |
1 |
|
|a Fried, Stephen ,
|d 1962- ,
|e author
|
| 245 |
1 |
0 |
|a Mobile device security :
|b a comprehensive guide to securing your information in a moving world
|c Stephen Fried
|
| 260 |
|
|
|a Boca Raton, Florida :
|b Taylor & Francis Group ,
|c c2010
|
| 300 |
|
|
|a xxviii, 274 p. :
|b ill. ;
|c 24 cm.
|
| 504 |
|
|
|a Includes bibliographical references and index
|
| 505 |
0 |
|
|a 1. What are you trying to protect? -- 2. It's all about the risk -- 3. The many faces of mobility -- 4. Data at rest, data in motion -- 5. Mobile data security models -- 6. Encryption -- 7. Defense-in-depth: mobile security controls -- 8. Defense-in-depth: specific technology controls -- 9. Creating a mobile security policy -- 10. Building the business case for mobile security
|
| 520 |
|
|
|a Explaining how mobile devices can create backdoor security threats, this title specifies immediate actions you can take to defend against these threats. Highlighting the risks inherent when mobilizing data, it supplies a proven methodology for identifying, analyzing, and evaluating these risks
|
| 650 |
|
0 |
|a Computer security
|
| 650 |
|
0 |
|a Data protection
|
| 650 |
|
0 |
|a Mobile communication systems
|v Security measures
|
| 999 |
|
|
|a 1000141475
|b Book
|c OPEN SHELF (30 DAYS)
|e Gong Badak Campus
|