Close
Enter your search into one or more of the boxes below:
You can refine your search by selecting from any of the options below:
Search
Mobile Security: A Pocket Guide

Mobile Security: A Pocket Guide (Paperback)

£9.95
To Order. Estimated despatch in 1-3 weeks.
Email me when back in stock

Synopsis

Mobile devices represent an increasingly important proportion of the technology market, with laptops, PDAs and smartphones all offering substantial opportunities to improve personal communications and business flexibility. In addition, removable storage, such as memory sticks, now enables enormous quantities of data to be carried around, making it available to use on demand in any location. However, such undoubted advantages can also bring considerable risks, with devices being physically vulnerable to loss, theft and damage, as well as potentially exposed to various forms of electronic attack. As such, there is a significant and growing need for protection, in order to enable us to get the best out of the kit in an otherwise dangerous digital world. The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems.

The key themes tackled in the chapters are as follows: * the importance of mobile technologies * physical threats in the outside world * dealing with network connectivity * authenticating the user * other mechanisms for protecting mobile data * attacks facing mobile devices and users * the potential limitations of mobile security features. The content is essentially applicable to anyone using and deploying mobile devices, but particularly relevant to those wanting guidance on why protection is required and what should be done to achieve it (while at the same time noting that it is not a detailed how-to guide for any particular technology platform). In addition to the main discussion and evidence, each chapter concludes with a series of takeaways that summarise the key messages, and can be used as high-level reminders of the points that we need to remember.

Computing & ITComputer securityComputing & ITComputing: general Publisher: IT Governance Publishing Publication Date: 16/07/2009 ISBN-13: 9781849280204  Details: Type: Paperback Format: Books
Availability: To Order. Estimated despatch in 1-3 weeks.  

Prof. Steven Furnell is the head of the Centre for Information Security & Network Research at the University of Plymouth in the United Kingdom, and an Adjunct Professor with Edith Cowan University in Western Australia. He has been active in security-related research since 1992, with interests including security management, computer crime, user authentication and security usability. During his academic career to date, Prof. Furnell has authored over 190 papers in refereed international journals and conference proceedings, as well as a number of books including Cybercrime: Vandalizing the Information Society (Addison Wesley, 2001) and Computer Insecurity: Risking the System (Springer, 2005). He is also the editor-in-chief of Information Management & Computer Security, and an associate editor for other journals including Computers & Security and Security & Communication Networks. In addition, he is the co-chair of the Human Aspects of Information Security & Assurance (HAISA) symposium, and he has served as a programme committee member for over 120 other international conference events. Prof. Furnell is a Fellow and Branch Chair of the British Computer Society (BCS) and a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE). He is also active as a UK representative in International Federation for Information Processing (IFIP) working groups relating to Information Security Management (of which he is the current chair) and Information Security Education. Further details can be found at www.plymouth.ac.uk/cisnr.

More books by Steven Furnell

Leave Review

Delivery

Delivery Options

All delivery times quoted are the average, and cannot be guaranteed. These should be added to the availability message time, to determine when the goods will arrive. During checkout we will give you a cumulative estimated date for delivery.

Location 1st Book Each additional book Average Delivery Time
UK Second Class Available free for ALL orders. No charge for each additional book. 3-7 Days
UK First Class £4.50 £1.00 1-2 Days
UK Courier £7.00 £1.00 1-2 Days
Western Europe** Courier £17.00 £3.00 2-3 Days
Western Europe** Airmail £5.00 £1.50 4-14 Days
USA / Canada Courier £20.00 £3.00 2-4 Days
USA / Canada Airmail £7.00 £3.00 4-14 Days
Rest of World Courier £22.50 £3.00 3-6 Days
Rest of World Airmail £8.00 £3.00 7-21 Days

** Includes Austria, Belgium, Denmark, France, Germany, Greece, Iceland, Irish Republic, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and Switzerland.

Delivery Help & FAQs

Returns Information

If you are not completely satisfied with your purchase*, you may return it to us in its original condition with in 30 days of receiving your delivery or collection notification email for a refund. Except for damaged items or delivery issues the cost of return postage is borne by the buyer. Your statutory rights are not affected.

* For Exclusions and terms on damaged or delivery issues see Returns Help & FAQs

You might also like

Big Data: How the Information...
(Paperback)
Brian Clegg
 
 
£7.99
 
Joomla! Fur Redakteure
(Paperback)
Axel Tuting
 
 
£6.99
 

Currently out of stock

Python for Scientists
(Paperback)
John M. Stewart
 
 
£29.99
 
Online Risk to Children: Impact,...
(Paperback)
Jon Brown
 
 
£34.99
 
Latest Blog
ZED Books: The role of the independent publisher in a content-obsessed world
18/08/2017

Indie publisher ZED Books have a radical approach to their books and their company structure. Here, they talk to us about the role independent publishers can play in a world of ever expanding (and less than reliable) information sources.

Blog - J R Wallis on Monsters as Metaphors
16/08/2017

J R Wallis questions the conventional view of monsters as metaphors for the worries we have about the state of the world around us.

#FoylesFive: Creative Women
14/08/2017

Meg from the Web Team tells us why she loves to learn about creative, dynamic women.

View all Blog Entries
Twitter
Show/Hide Tweets
© W&G Foyle Ltd