Mobile device security : a comprehensive guide to securing your information in a moving world
Explaining how mobile devices can create backdoor security threats, this title specifies immediate actions you can take to defend against these threats. Highlighting the risks inherent when mobilizing data, it supplies a proven methodology for identifying, analyzing, and evaluating these risks
| Main Author: | Fried, Stephen , 1962- (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, Florida :
Taylor & Francis Group ,
c2010
|
| Subjects: |
Similar Items
Mobile application security
by: Dwivedi, Himanshu, et al.
Published: (2010)
by: Dwivedi, Himanshu, et al.
Published: (2010)
Security of mobile communications
by: Boudriga, Noureddine
Published: (2010)
by: Boudriga, Noureddine
Published: (2010)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Wireless security
by: Osterhage, Wolfgang
Published: (2012)
by: Osterhage, Wolfgang
Published: (2012)
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009)
by: Collette, Ronald D., et al.
Published: (2009)
Information security for managers
by: Workman, Michael D. 1957-, et al.
Published: (2013)
by: Workman, Michael D. 1957-, et al.
Published: (2013)
Cloud security : a general guide to secured computing
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
Internet security secrets
by: Vacca, John R.
Published: (1996)
by: Vacca, John R.
Published: (1996)
Computer security
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
by: Carroll, John M. (John Millar) 1950-
Published: (1987)
Wireless network security
by: Du, Dingzhu, et al.
Published: (2007)
by: Du, Dingzhu, et al.
Published: (2007)
Optimizing ieee 802.11i resource and security essentials for mobile and stationary devices
by: Naraei, Parisa, et al.
Published: (2015)
by: Naraei, Parisa, et al.
Published: (2015)
Security strategy from requirements to reality
by: Stackpole, Bill, et al.
Published: (2011)
by: Stackpole, Bill, et al.
Published: (2011)
Information security intelligence cryptographic principles and applications
by: Calabrese, Thomas
Published: (2004)
by: Calabrese, Thomas
Published: (2004)
Digital business security development management technologies
by: Bryant, Kay 1954-, et al.
Published: (2011)
by: Bryant, Kay 1954-, et al.
Published: (2011)
CWSP guide to wireless security
by: Ciampa, Mark D.
Published: (2007)
by: Ciampa, Mark D.
Published: (2007)
Wireless security models, threats and solutions
by: Nichols, Randall K., et al.
Published: (2002)
by: Nichols, Randall K., et al.
Published: (2002)
Secure multi-party non-repudiation protocols and applications
by: Onieva, Jose A., et al.
Published: (2009)
by: Onieva, Jose A., et al.
Published: (2009)
Information security management handbook .
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2012)
Published: (2012)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
Hacking exposed network security secrets and solutions
by: McClure, Stuart, et al.
Published: (2005)
by: McClure, Stuart, et al.
Published: (2005)
Hacking exposed 6 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2009)
by: McClure, Stuart, et al.
Published: (2009)
Analyzing computer security a threat/vulnerability/countermeasure approach
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2012)
Information security management handbook Volume 4
Information security management concepts and practice
by: Raggad, Bel G.
Published: (2010)
by: Raggad, Bel G.
Published: (2010)
LAN times guide to security and data integrity
by: Farley, Marc, et al.
Published: (1996)
by: Farley, Marc, et al.
Published: (1996)
CompTIA security + guide to network security fundamentals
by: Ciampa, Mark
by: Ciampa, Mark
IT security metrics a practical framework for measuring security & protecting data
by: Hayden, Lance
Published: (2010)
by: Hayden, Lance
Published: (2010)
Practical information security management a completeguide to planning and implementation
by: Campbell, Tony
by: Campbell, Tony
Mobile computing
by: Kamal, Raj 1949-
Published: (2012)
by: Kamal, Raj 1949-
Published: (2012)
Internet content regulation contemporary legal and regulatory issues in the changing digital landscape
by: Mahyuddin Daud
Published: (2019)
by: Mahyuddin Daud
Published: (2019)
Information privacy engineering and privacy by design understanding privacy threats, technology, and regulations based on standards and best practices
by: Stallings, William
Published: (2020)
by: Stallings, William
Published: (2020)
Security in computing
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
by: Pfleeger, Charles P. 1948-, et al.
Published: (2007)
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny, et al.
Published: (2010)
by: Cache, Johnny, et al.
Published: (2010)
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny, et al.
Published: (2007)
by: Cache, Johnny, et al.
Published: (2007)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Micheal, et al.
Published: (2013)
by: Raggo, Micheal, et al.
Published: (2013)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
UNIX system security how to protect your date and prevent intruders
by: Farrow, Rik 1950-
Published: (1991)
by: Farrow, Rik 1950-
Published: (1991)
Security in wireless LANs and MANs [electronic resource]
by: Hardjono, Thomas, et al.
Published: (2005)
by: Hardjono, Thomas, et al.
Published: (2005)
Similar Items
-
Mobile application security
by: Dwivedi, Himanshu, et al.
Published: (2010) -
Security of mobile communications
by: Boudriga, Noureddine
Published: (2010) -
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007) -
Wireless security
by: Osterhage, Wolfgang
Published: (2012) -
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D., et al.
Published: (2009)