Explaining how mobile devices can create backdoor security threats, "Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World" specifies immediate actions to take to defend against these threats.
Explaining how mobile devices can create backdoor security threats, "Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World" specifies immediate actions to take to defend against these threats.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Stephen Fried is a seasoned information security professional with more than 25 years experience in information technology. For the past 14 years, Stephen has concentrated his efforts on providing effective information security leadership to large organizations. He has led the creation of security programs for Fortune 500 companies and has extensive background in such diverse security issues as risk assessment and management, security policy development, security architecture, infrastructure and perimeter security design, outsource relationship security, offshore development, intellectual property protection, security technology development, business continuity, secure e-business design, and information technology auditing. A frequent invited speaker at conferences, Stephen is also active in many security industry organizations. He is a contributing author to the Information Security Management Handbook and has also been quoted in Secure Enterprise and CIO Decisions.
Inhaltsangabe
Introduction. What Are You Trying to Protect? It's All About the Risk. The Many Faces of Mobility. Data at Rest, Data in Motion. Mobile Data Security Models. Encryption. Defense in Depth: Mobile Security Controls. Defense in Depth: Specific Technology Controls. Creating a Mobile Security Policy. Building the Business Case for Mobile Security. Each chapter includes a "Conclusion" and an "Action Plan".
Introduction. What Are You Trying to Protect? It's All About the Risk. The Many Faces of Mobility. Data at Rest, Data in Motion. Mobile Data Security Models. Encryption. Defense in Depth: Mobile Security Controls. Defense in Depth: Specific Technology Controls. Creating a Mobile Security Policy. Building the Business Case for Mobile Security. Each chapter includes a "Conclusion" and an "Action Plan".
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826