๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Securing the mobile device

โœ Scribed by Bruce Potter


Publisher
Elsevier Science
Year
2004
Tongue
English
Weight
98 KB
Volume
2004
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Securing mobile workers
โœ Nick Garlick ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier Science โš– 91 KB

Mobile workers are the weakest link the security chain. Nick Garlick says that mobile security is not an oxymoron.

Securing mobile devices: technology and
โœ Steven Furnell ๐Ÿ“‚ Article ๐Ÿ“… 2006 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 106 KB

Phishing is on the move. Cyber criminals are continually trying to find new ways to catch users off-guard. This may include new technological developments or it may simply mean using some topical 'hook' to beguile users. Here is a roundup of where it is today.

Securing the global, remote, mobile user
โœ Walt Curtis; Lori Sinton ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 957 KB

## Securing the Global, Remote, Mobile User Electronic commerce is inevitable and will reshape our lives, but before true electronic commerce environments can be realized, it will be necessary to secure your enterprise against outside attacks on its electronic information and provide controls for

Mobile Security โ€” New Needs on New Devic
๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 258 KB

## Anytime, anywhere on any device Marketing tells us that a new era of mobility has just begun. Millions of socalled Personal Digital Assistants (PDA) have been sold over the past few years. Together with other mobility technologies like notebooks, mobile phones, wireless LAN, Bluetooth etc. they

Your firm's mobile devices: How secure a
โœ Harry R. Wright Jr.; J. Lowell Mooney; Abbie Gail Parham ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 147 KB

## Abstract Mobile communication devices are taking the world by a storm. They offer significant benefits. But when deciding whether your company can benefit from giving mobile devices to employees, it is important to think strategically. Do you have a comprehensive mobile security strategy? Do you