|
![]() |
|||
|
||||
OverviewThe information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate information. Provides a practical, fast-track approach to protecting a mobile device from security threats Discusses important topics such as specific hacker protection, loss/theft protection, backing up and restoring data, and more Offers critical advice for deploying enterprise network protection for mobile devices Walks you through the advantages of granular application access control and enforcement with VPN Business can be mobile without being vulnerable?and Mobile Device Security For Dummies shows you how. Full Product DetailsAuthor: Rich Campagna , Subbu Iyer , Ashwin Krishnan , Mark BauhausPublisher: John Wiley and Sons Ltd Imprint: John Wiley & Sons Ltd Dimensions: Width: 19.00cm , Height: 1.70cm , Length: 23.50cm Weight: 0.484kg ISBN: 9780470927533ISBN 10: 0470927534 Pages: 312 Publication Date: 05 August 2011 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsIntroduction 1 Part I: Living Securely in the Smart World 7 Chapter 1: What?s So Smart About a Phone, Anyway? 9 Chapter 2 : Why Do I Care? The Mobile Device Threat 33 Chapter 3 : Planning for Mobile Devices in the Enterprise 57 Part II: Implementing Enterprise Mobile Security 77 Chapter 4: Creating Mobile Device Security Policies 79 Chapter 5: Managing and Controlling Devices 105 Chapter 6: Conforming to Corporate Compliance Policies 127 Part III: Securing Smart Device Access 147 Chapter 7: Securing Data in Transit with VPNs 149 Chapter 8: Connecting to Wi-Fi Networks 177 Part IV: Securing Each Smart Device 187 Chapter 9: Device Security Component Overview 189 Chapter 10: Hacker Protection and Enforceable Encryption 209 Chapter 11: Protecting Against Loss and Theft 233 Chapter 12: Educating Users about Backing Up Data 247 Chapter 13: Securing Mobile Applications 263 Part V: The Part of Tens 273 Chapter 14: Top Ten Online Information Sources 275 Chapter 15: Top Ten Mobile Security Vendors 279 Index 283ReviewsAuthor InformationRich Campagna is a Director of Product Management at Juniper Networks and a former sales engineer for Sprint. Subbu Iyer is a Senior Product Manager at Juniper Networks and strategist for Junos Pulse. Ashwin Krishnan is a Director of Product Management at Juniper Networks and a former Nokia employee. Tab Content 6Author Website:Countries AvailableAll regions |