سبد خرید  cart.gif |  حساب من |  تماس با ما |  راهنما     Search
موضوعات مرتبط
Cover image for product 0470927534
Mobile Device Security For Dummies
Campagna
ISBN: 978-0-470-92753-3
Paperback
312 pages
May 2011
This is an out of Print Title.
  • Description
  • Table of Contents
  • Author Information
Factor mobile devices into your IT equation and learn to work securely in this smart new world

Smartphones and tablets have invaded the workplace, and your employees are using them to access the Internet, transmit information, and even communicate with internal systems every day. Security nightmare? It doesn't have to be! Read this book and you'll uncover how to lock down those mobile devices so doing business on the go doesn't do you in.

  • You can't beat 'em — see how to assimilate smartphones, tablets, and other mobile devices safely into your organization

  • Know the players — understand and accommodate the needs of users, admins, management, and vendors; they all have a stake in mobile device security

  • Explore your options — compare mobile device management solutions, including Exchange ActiveSync and Open Mobile Alliance Device Management

  • Make policies work together — learn to structure policies for mobile devices that comply with existing company policies

  • Examine the tools — discover all the advantages your VPN can provide

  • The big picture — create loss/theft protection, anti-virus, and backup/restore protocols

  • Real-world application — review case studies that use Junos Pulse and learn how solutions have been applied

Open the book and find:

  • Threats posed by mobile apps

  • Why remote management is important

  • What you can and can't control

  • Tips for effective enforcement

  • Advice on keeping policies up to date

  • Options for anti-hacker protection

  • Loss/theft procedures for Apple iOS, Symbian, and Android devices

  • Ten steps to take when allowing smartphones on your network

Learn to:

  • Protect your company's mobile devices against online threats, loss, or theft

  • Back up and restore critical data and documents

  • Control and enforce granular access with VPNs

  • Develop and implement a corporate mobile security plan

Wiley Global Education
Educational materials in all media for colleges and universities.