• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World

ISBN-13: 9781439820162 / Angielski / Twarda / 2010 / 302 str.

Stephen Fried
Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World Fried, Stephen 9781439820162 Taylor & Francis - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World

ISBN-13: 9781439820162 / Angielski / Twarda / 2010 / 302 str.

Stephen Fried
cena 351,15 zł
(netto: 334,43 VAT:  5%)

Najniższa cena z 30 dni: 347,53 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

As each generation of portable electronic devices and storage media becomes smaller, higher in capacity, and easier to transport, it's becoming increasingly difficult to protect the data on these devices while still enabling their productive use in the workplace. Explaining how mobile devices can create backdoor security threats, Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World specifies immediate actions you can take to defend against these threats. It begins by introducing and defining the concepts essential to understanding the security threats to contemporary mobile devices, and then takes readers through all the policy, process, and technology decisions that must be made to create an effective security strategy. Highlighting the risks inherent when mobilizing data, the text supplies a proven methodology for identifying, analyzing, and evaluating these risks. It examines the various methods used to store and transport mobile data and illustrates how the security of that data changes as it moves from place to place. Addressing the technical, operational, and compliance issues relevant to a comprehensive mobile security policy, the text:

  • Provides methods for modeling the interaction between mobile data and mobile devices-detailing the advantages and disadvantages of each
  • Explains how to use encryption and access controls to protect your data
  • Describes how to layer different technologies to create a resilient mobile data protection program
  • Provides examples of effective mobile security policies and discusses the implications of different policy approaches
  • Highlights the essential elements of a mobile security business case and provides examples of the information such proposals should contain
  • Reviews the most common mobile device controls and discusses the options for implementing them in your mobile environment
Securing your mobile data requires the proper balance between security, user acceptance, technology capabilities, and resource commitment. Supplying real-life examples and authoritative guidance, this complete resource walks you through the process of creating an effective mobile security program and provides the understanding required to develop a customized approach to securing your information.

Kategorie:
Nauka, Ekonomia i biznes
Kategorie BISAC:
Business & Economics > Commerce
Computers > Information Technology
Computers > Security - General
Wydawca:
Taylor & Francis
Język:
Angielski
ISBN-13:
9781439820162
Rok wydania:
2010
Ilość stron:
302
Waga:
0.56 kg
Wymiary:
23.62 x 15.75 x 2.29
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Writing with organizations in mind, Fried, an information security professional who creates security programs for large companies, presents a guide to securing mobile data and devices against threats, and the policy, process, and technology decisions needed to create effective security strategy. He covers the risks involved in mobile data and identifying, analyzing, and evaluating them; methods used to store and transport data and how its security changes as it moves from place to place; the advantages and disadvantages of different security models; encryption; mobile security and specific technology controls; creating a policy; and the elements of a mobile security business case.
—In Research Book News, booknews.com, February 2011

Introduction. What Are You Trying to Protect? It’s All About the Risk. The Many Faces of Mobility. Data at Rest, Data in Motion. Mobile Data Security Models. Encryption. Defense in Depth: Mobile Security Controls. Defense in Depth: Specific Technology Controls. Creating a Mobile Security Policy. Building the Business Case for Mobile Security. Each chapter includes a "Conclusion" and an "Action Plan".

Stephen Fried is a seasoned information security professional with more than 25 years experience in information technology. For the past 14 years, Stephen has concentrated his efforts on providing effective information security leadership to large organizations. He has led the creation of security programs for Fortune 500 companies and has extensive background in such diverse security issues as risk assessment and management, security policy development, security architecture, infrastructure and perimeter security design, outsource relationship security, offshore development, intellectual property protection, security technology development, business continuity, secure e-business design, and information technology auditing. A frequent invited speaker at conferences, Stephen is also active in many security industry organizations. He is a contributing author to the Information Security Management Handbook and has also been quoted in Secure Enterprise and CIO Decisions.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia