𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

A comprehensive guide to enterprise mobility

✍ Scribed by Jithesh Sathyan; et al


Publisher
CRC Press
Year
2013
Tongue
English
Leaves
538
Series
Infosys Press (Series)
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Front Cover......Page 1
A Comprehensive Guide to Enterprise Mobility......Page 4
Copyright......Page 5
Table of Contents......Page 6
Foreword......Page 26
Preface......Page 28
Section I: Mobility Concepts......Page 30
1. Emergence of Enterprise Mobility......Page 32
2. Enterprise Mobility Landscape......Page 50
3. Enterprise Mobility Adoption......Page 64
4. Mobile as an Effective Marketing Channel......Page 78
5. Enterprise Mobility Layers......Page 92
6. Mobility Solution Architecture......Page 104
7. Mobility Significance and Solution Lifecycle......Page 118
8. Cross-Platform Development......Page 128
9. Mobile Application Testing......Page 136
10. Mobile Solution Deployment......Page 154
Section II: Mobile Solutions and Case Studies......Page 168
11. Mobility Solutions for the Retail Industry......Page 170
12. Mobility Solutions for the Transportation Industry......Page 186
13. Mobility Solutions for the Manufacturing and Supply-Chain Industry......Page 198
14. Mobility Solutions for the Healthcare Industry......Page 214
15. Mobility Solutions for the Telecom Industry......Page 234
16. Mobility Solutions for Energy and Utilities......Page 248
17. Mobility Solutions for the Financial Service Industry......Page 262
Section III: Mobile Application Development......Page 280
18. Mobile Platforms......Page 282
19. Mobile Application Designing......Page 320
20. Mobile Programming......Page 330
Section IV: Technology Considerations in Mobility......Page 384
21. Mobile Security......Page 386
22. Mobile NFC......Page 400
23. Device Capabilities Leveraged in Apps Location, Magnetometer, Motion Sensor, Touch, and Scanner......Page 416
24. Mobile Application Porting......Page 434
25. Mobile Cloud Computing......Page 454
26. Mobile Virtualization......Page 468
27. Mobile 3D Solutions......Page 480
28. Mobile Signage......Page 492
29. Mobile Device Management......Page 508
30. Popular Mobile Solutions in the Market (Anti Virus, ERP, SAP, SCM, etc.)......Page 522
Back Cover......Page 538


πŸ“œ SIMILAR VOLUMES


Cybersecurity Strategies and Best Practi
✍ Milad Aslaner πŸ“‚ Library πŸ“… 2024 πŸ› Packt Publishing 🌐 English

Elevate your organization's cybersecurity posture by implementing proven strategies and best practices to stay ahead of emerging threats Key Features Benefit from a holistic approach and gain practical guidance to align security strategies with your business goals Derive actionable insights from r

A Comprehensive Guide to Intersex
✍ Jay Kyle Petersen πŸ“‚ Library πŸ“… 2020 πŸ› Jessica Kingsley Publishers 🌐 English

<p>This comprehensive yet accessible resource provides readers with everything they need to know about intersex - people who are born with any range of sex characteristics that might not fit typical binary notions about male and female bodies. <br>Covering a wide variety of topics in an easy-to-read

My First Mobile App for Students : A com
✍ Zaid Kamil; πŸ“‚ Library πŸ“… 2024 πŸ› BPB Publications 🌐 English

Learn the basics of Kotlin and build your first Android app. Key Features: - Build real-world apps from scratch with UI and coding. - Learn about the latest trends in Android development, including modern architecture patterns, UI design principles, and the Jetpack suite of libraries. - Disc

Azure Security Handbook: A Comprehensive
✍ Karl Ots πŸ“‚ Library πŸ“… 2021 πŸ› Apress 🌐 English

<p>Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the

Azure Security Handbook: A Comprehensive
✍ Karl Ots πŸ“‚ Library πŸ“… 2021 πŸ› Apress 🌐 English

<p>Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the