Elevate your organization's cybersecurity posture by implementing proven strategies and best practices to stay ahead of emerging threats Key Features Benefit from a holistic approach and gain practical guidance to align security strategies with your business goals Derive actionable insights from r
A comprehensive guide to enterprise mobility
β Scribed by Jithesh Sathyan; et al
- Publisher
- CRC Press
- Year
- 2013
- Tongue
- English
- Leaves
- 538
- Series
- Infosys Press (Series)
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Front Cover......Page 1
A Comprehensive Guide to Enterprise Mobility......Page 4
Copyright......Page 5
Table of Contents......Page 6
Foreword......Page 26
Preface......Page 28
Section I: Mobility Concepts......Page 30
1. Emergence of Enterprise Mobility......Page 32
2. Enterprise Mobility Landscape......Page 50
3. Enterprise Mobility Adoption......Page 64
4. Mobile as an Effective Marketing Channel......Page 78
5. Enterprise Mobility Layers......Page 92
6. Mobility Solution Architecture......Page 104
7. Mobility Significance and Solution Lifecycle......Page 118
8. Cross-Platform Development......Page 128
9. Mobile Application Testing......Page 136
10. Mobile Solution Deployment......Page 154
Section II: Mobile Solutions and Case Studies......Page 168
11. Mobility Solutions for the Retail Industry......Page 170
12. Mobility Solutions for the Transportation Industry......Page 186
13. Mobility Solutions for the Manufacturing and Supply-Chain Industry......Page 198
14. Mobility Solutions for the Healthcare Industry......Page 214
15. Mobility Solutions for the Telecom Industry......Page 234
16. Mobility Solutions for Energy and Utilities......Page 248
17. Mobility Solutions for the Financial Service Industry......Page 262
Section III: Mobile Application Development......Page 280
18. Mobile Platforms......Page 282
19. Mobile Application Designing......Page 320
20. Mobile Programming......Page 330
Section IV: Technology Considerations in Mobility......Page 384
21. Mobile Security......Page 386
22. Mobile NFC......Page 400
23. Device Capabilities Leveraged in Apps Location, Magnetometer, Motion Sensor, Touch, and Scanner......Page 416
24. Mobile Application Porting......Page 434
25. Mobile Cloud Computing......Page 454
26. Mobile Virtualization......Page 468
27. Mobile 3D Solutions......Page 480
28. Mobile Signage......Page 492
29. Mobile Device Management......Page 508
30. Popular Mobile Solutions in the Market (Anti Virus, ERP, SAP, SCM, etc.)......Page 522
Back Cover......Page 538
π SIMILAR VOLUMES
<p>This comprehensive yet accessible resource provides readers with everything they need to know about intersex - people who are born with any range of sex characteristics that might not fit typical binary notions about male and female bodies. <br>Covering a wide variety of topics in an easy-to-read
Learn the basics of Kotlin and build your first Android app. Key Features: - Build real-world apps from scratch with UI and coding. - Learn about the latest trends in Android development, including modern architecture patterns, UI design principles, and the Jetpack suite of libraries. - Disc
<p>Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organizationβs network, but in the era of cloud computing, both the
<p>Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organizationβs network, but in the era of cloud computing, both the