pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: MOBILE SECURITY
A POCKET GUIDE
By: Steven Furnell
Format: Paperback

List price: £19.95


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1849280207
ISBN 13: 9781849280204
Publisher: IT GOVERNANCE PUBLISHING
Pub. date: 16 July, 2009
Pages: 72
Description: Offers a reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. This title aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems.
Synopsis: Mobile devices represent an increasingly important proportion of the technology market, with laptops, PDAs and smartphones all offering substantial opportunities to improve personal communications and business flexibility. In addition, removable storage, such as memory sticks, now enables enormous quantities of data to be carried around, making it available to use on demand in any location. However, such undoubted advantages can also bring considerable risks, with devices being physically vulnerable to loss, theft and damage, as well as potentially exposed to various forms of electronic attack. As such, there is a significant and growing need for protection, in order to enable us to get the best out of the kit in an otherwise dangerous digital world. The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems.The key themes tackled in the chapters are as follows: * the importance of mobile technologies * physical threats in the outside world * dealing with network connectivity * authenticating the user * other mechanisms for protecting mobile data * attacks facing mobile devices and users * the potential limitations of mobile security features. The content is essentially applicable to anyone using and deploying mobile devices, but particularly relevant to those wanting guidance on why protection is required and what should be done to achieve it (while at the same time noting that it is not a detailed how-to guide for any particular technology platform). In addition to the main discussion and evidence, each chapter concludes with a series of takeaways that summarise the key messages, and can be used as high-level reminders of the points that we need to remember.
Illustrations: Illustrations
Publication: UK
Imprint: IT Governance Publishing
Returns: Non-returnable
Some other items by this author:
ADVANCES IN COMMUNICATIONS, COMPUTING, NETWORKS AND SECURITY (PB)
ADVANCES IN COMMUNICATIONS, COMPUTING, NETWORKS AND SECURITY (PB)
ADVANCES IN COMMUNICATIONS, COMPUTING, NETWORKS AND SECURITY (PB)
ADVANCES IN COMMUNICATIONS, COMPUTING, NETWORKS AND SECURITY (PB)
ADVANCES IN COMMUNICATIONS, COMPUTING, NETWORKS AND SECURITY (PB)
ADVANCES IN COMMUNICATIONS, COMPUTING, NETWORKS AND SECURITY (PB)
ADVANCES IN NETWORKS, COMPUTING AND COMMUNICATIONS (PB)
ADVANCES IN NETWORKS, COMPUTING AND COMMUNICATIONS (PB)
COMPUTER INSECURITY (PB)
CYBERCRIME (PB)
E-MAIL SECURITY
E-MAIL SECURITY (PB)
INFORMATION SECURITY AND PRIVACY RESEARCH (HB)
INFORMATION SECURITY AND PRIVACY RESEARCH (PB)
MOBILE SECURITY
PROCEEDINGS OF THE EIGHTH INTERNATIONAL NETWORK CONFERENCE (INC 2010) (PB)
PROCEEDINGS OF THE EIGHTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA) (PB)
PROCEEDINGS OF THE EUROPEAN INFORMATION SECURITY MULTI-CONFERENCE (EISMC 2013) (PB)
PROCEEDINGS OF THE FIFTH COLLABORATIVE RESEARCH SYMPOSIUM ON SECURITY, E-LEARNING, INTERNET AND NETWORKING (SEIN 2009) (PB)
PROCEEDINGS OF THE FIFTH INTERNATIONAL NETWORK CONFERENCE (INC 2005) (PB)
PROCEEDINGS OF THE FIFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2011) (PB)
PROCEEDINGS OF THE FOURTH COLLABORATIVE RESEARCH SYMPOSIUM ON SECURITY, E-LEARNING, INTERNET AND NETWORKING (PB)
PROCEEDINGS OF THE FOURTH INTERNATIONAL NETWORK CONFERENCE (INC 2004) (PB)
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE (HAISA 2007) (PB)
PROCEEDINGS OF THE NINTH INTERNATIONAL NETWORK CONFERENCE: INC (PB)
PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2015) (PB)
PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE (HAISA 2008) (PB)
PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE: HAISA (PB)
PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE (SAISMC 2010) (PB)
PROCEEDINGS OF THE TENTH INTERNATIONAL NETWORK CONFERENCE (INC) (PB)
PROCEEDINGS OF THE TENTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2016) (PB)
PROCEEDINGS OF THE THIRD COLLABORATIVE RESEARCH SYMPOSIUM ON SECURITY, E-LEARNING, INTERNET AND NETWORKING (SEIN 2007) (PB)
PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE (HAISA 2009) (PB)
PROTECTING MOBILE NETWORKS AND DEVICES
PROTECTING MOBILE NETWORKS AND DEVICES (HB)
SECURING INFORMATION AND COMMUNICATIONS SYSTEMS (HB)
SECURITY MANAGEMENT, INTEGRITY, AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
SECURITY MANAGEMENT, INTEGRITY, AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
SEIN 2007: PROCEEDINGS OF THE THIRD COLLABORATIVE RESEARCH SYMPOSIUM ON SECURITY, E-LEARNING, INTERNET AND NETWORKING
TRUST AND PRIVACY IN DIGITAL BUSINESS (PB)
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (PB)
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (PB)
TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS (PB)

TOP SELLERS IN THIS CATEGORY
The Art of Invisibility (Paperback)
Little, Brown & Company
Our Price : £12.74
more details
Practical Packet Analysis, 3e (Paperback)
No Starch Press,US
Our Price : £35.03
more details
The Art of Intrusion (Paperback)
John Wiley and Sons Ltd
Our Price : £10.22
more details
The Art of Deception (Paperback)
John Wiley & Sons Inc
Our Price : £7.30
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket