Close
Enter your search into one or more of the boxes below:
You can refine your search by selecting from any of the options below:
Search
Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World

Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World (Hardback)

£58.99
Printed to order. Despatched in 2-3 weeks.
Email me when back in stock

Synopsis

As each generation of portable electronic devices and storage media becomes smaller, higher in capacity, and easier to transport, it's becoming increasingly difficult to protect the data on these devices while still enabling their productive use in the workplace. Explaining how mobile devices can create backdoor security threats, Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World specifies immediate actions you can take to defend against these threats. It begins by introducing and defining the concepts essential to understanding the security threats to contemporary mobile devices, and then takes readers through all the policy, process, and technology decisions that must be made to create an effective security strategy. Highlighting the risks inherent when mobilizing data, the text supplies a proven methodology for identifying, analyzing, and evaluating these risks. It examines the various methods used to store and transport mobile data and illustrates how the security of that data changes as it moves from place to place.

Addressing the technical, operational, and compliance issues relevant to a comprehensive mobile security policy, the text: * Provides methods for modeling the interaction between mobile data and mobile devices-detailing the advantages and disadvantages of each * Explains how to use encryption and access controls to protect your data * Describes how to layer different technologies to create a resilient mobile data protection program * Provides examples of effective mobile security policies and discusses the implications of different policy approaches * Highlights the essential elements of a mobile security business case and provides examples of the information such proposals should contain * Reviews the most common mobile device controls and discusses the options for implementing them in your mobile environment Securing your mobile data requires the proper balance between security, user acceptance, technology capabilities, and resource commitment.

Supplying real-life examples and authoritative guidance, this complete resource walks you through the process of creating an effective mobile security program and provides the understanding required to develop a customized approach to securing your information.

Computing & ITComputer security Publisher: Taylor & Francis Ltd Publication Date: 16/06/2010 ISBN-13: 9781439820162  Details: Type: Hardback Format: Books
Availability: Printed to order. Despatched in 2-3 weeks.  

Stephen Fried is a seasoned information security professional with more than 25 years experience in information technology. For the past 14 years, Stephen has concentrated his efforts on providing effective information security leadership to large organizations. He has led the creation of security programs for Fortune 500 companies and has extensive background in such diverse security issues as risk assessment and management, security policy development, security architecture, infrastructure and perimeter security design, outsource relationship security, offshore development, intellectual property protection, security technology development, business continuity, secure e-business design, and information technology auditing. A frequent invited speaker at conferences, Stephen is also active in many security industry organizations. He is a contributing author to the Information Security Management Handbook and has also been quoted in Secure Enterprise and CIO Decisions.

More books by Stephen Fried

Leave Review

Delivery

Delivery Options

All delivery times quoted are the average, and cannot be guaranteed. These should be added to the availability message time, to determine when the goods will arrive. During checkout we will give you a cumulative estimated date for delivery.

Location 1st Book Each additional book Average Delivery Time
UK Standard Delivery FREE FREE 3-5 Days
UK First Class £4.50 £1.00 1-2 Days
UK Courier £7.00 £1.00 1-2 Days
Western Europe** Courier £17.00 £3.00 2-3 Days
Western Europe** Airmail £5.00 £1.50 4-14 Days
USA / Canada Courier £20.00 £3.00 2-4 Days
USA / Canada Airmail £7.00 £3.00 4-14 Days
Rest of World Courier £22.50 £3.00 3-6 Days
Rest of World Airmail £8.00 £3.00 7-21 Days

** Includes Austria, Belgium, Denmark, France, Germany, Greece, Iceland, Irish Republic, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and Switzerland.

Delivery Help & FAQs

Returns Information

If you are not completely satisfied with your purchase*, you may return it to us in its original condition with in 30 days of receiving your delivery or collection notification email for a refund. Except for damaged items or delivery issues the cost of return postage is borne by the buyer. Your statutory rights are not affected.

* For Exclusions and terms on damaged or delivery issues see Returns Help & FAQs

You might also like

Lessons Learned: Critical Information...
(Paperback)
Toomas Viira
 
 
£24.95
 

Currently out of stock

Cyber Mercenaries: The State, ...
(Paperback)
Tim Maurer
 
 
£22.99
 
Infosec Rock Star: How to Accelerate...
(Paperback)
Ted Demopoulos
 
 
£13.95
 

Currently out of stock

Data Protection and Privacy: The Age...
(Hardback)
Ronald E. Leenes
 
 
£50.00
 
Latest Blog
Jealousy, Rivalry, Insecurity, Frustration... Non Pratt Explores the World of Female Teenage Friendships
16/01/2018

Non explores friendship in YA novels and especially those that depict the imperfect middle ground.

#FoylesFive: Pre-orders
15/01/2018

Matt from our Web Team jumps into the future and brings back some reading recommends for 2018.

Emily Koch Introduces Some of Fiction's Most Memorable Narrators
10/01/2018

Exclusively for Foyles, Emily introduces some of her favourite and most memorable first person narrators.

View all Blog Entries
Twitter
Show/Hide Tweets
© W&G Foyle Ltd