- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The information you need to avoid security threats on corporate mobile devices
Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate information.
Provides a practical, fast-track approach to protecting a mobile device from security threats
Discusses important topics such as specific hacker protection, loss/theft protection, backing up and restoring data, and more
Offers critical advice for deploying enterprise network protection for mobile devices
Walks you through the advantages of granular application access control and enforcement with VPN
Business can be mobile without being vulnerable?and Mobile Device Security For Dummies shows you how.
Contents
Introduction 1
Part I: Living Securely in the Smart World 7
Chapter 1: What s So Smart About a Phone, Anyway? 9
Chapter 2 : Why Do I Care? The Mobile Device Threat 33
Chapter 3 : Planning for Mobile Devices in the Enterprise 57
Part II: Implementing Enterprise Mobile Security 77
Chapter 4: Creating Mobile Device Security Policies 79
Chapter 5: Managing and Controlling Devices 105
Chapter 6: Conforming to Corporate Compliance Policies 127
Part III: Securing Smart Device Access 147
Chapter 7: Securing Data in Transit with VPNs 149
Chapter 8: Connecting to Wi-Fi Networks 177
Part IV: Securing Each Smart Device 187
Chapter 9: Device Security Component Overview 189
Chapter 10: Hacker Protection and Enforceable Encryption 209
Chapter 11: Protecting Against Loss and Theft 233
Chapter 12: Educating Users about Backing Up Data 247
Chapter 13: Securing Mobile Applications 263
Part V: The Part of Tens 273
Chapter 14: Top Ten Online Information Sources 275
Chapter 15: Top Ten Mobile Security Vendors 279
Index 283