|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn769928298 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120102s2011 enk ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d YDXCP
|d N$T
|d OCLCQ
|d COO
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d UMI
|d E7B
|d DOS
|d DEBBG
|d OCLCQ
|d CNNOR
|d Z5A
|d MERUC
|d OCLCQ
|d CEF
|d STF
|d AU@
|d OCLCQ
|d DKC
|d OCLCQ
|d UAB
|d UKAHL
|d OCLCQ
|d VT2
|d VLY
|d BRF
|d EYM
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 808341560
|a 810455378
|a 981614426
|a 981867208
|a 1006304267
|a 1058125543
|a 1083483993
|a 1153033809
|a 1162557363
|a 1179690116
|a 1192328530
|a 1194730647
|a 1240524083
|
020 |
|
|
|a 9781780171128
|q (electronic bk.)
|
020 |
|
|
|a 1780171129
|q (electronic bk.)
|
020 |
|
|
|a 9781780171135
|q (Kindle)
|
020 |
|
|
|a 1780171137
|q (Kindle)
|
020 |
|
|
|z 9781780171111
|
020 |
|
|
|z 1780171110
|
029 |
1 |
|
|a AU@
|b 000050155596
|
029 |
1 |
|
|a AU@
|b 000050542824
|
029 |
1 |
|
|a AU@
|b 000053284627
|
029 |
1 |
|
|a CHNEW
|b 000619417
|
029 |
1 |
|
|a DEBBG
|b BV040887645
|
029 |
1 |
|
|a DEBSZ
|b 378296868
|
029 |
1 |
|
|a DEBSZ
|b 397219199
|
029 |
1 |
|
|a NZ1
|b 15122704
|
035 |
|
|
|a (OCoLC)769928298
|z (OCoLC)808341560
|z (OCoLC)810455378
|z (OCoLC)981614426
|z (OCoLC)981867208
|z (OCoLC)1006304267
|z (OCoLC)1058125543
|z (OCoLC)1083483993
|z (OCoLC)1153033809
|z (OCoLC)1162557363
|z (OCoLC)1179690116
|z (OCoLC)1192328530
|z (OCoLC)1194730647
|z (OCoLC)1240524083
|
037 |
|
|
|a CL0500000165
|b Safari Books Online
|
050 |
|
4 |
|a QA76.59 .M458 2011
|
072 |
|
7 |
|a COM
|x 020000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043060
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Mobile computing :
|b securing your workforce.
|
260 |
|
|
|a Swindon :
|b British Informatics Society,
|c 2011.
|
300 |
|
|
|a 1 online resource (54 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Copyright; CONTENTS; FOREWORD; 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL; WHAT IS A 'BETTER CONNECTED' WORKFORCE?; 'PROSUMERISATION'; WHAT ARE THE BUSINESS DRIVERS?; LOOKING FORWARD; ENSURING SAFE END-USER ADOPTION; CONCLUSION; 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH; PUTTING THE RIGHT TOOLS IN PLACE; 3 SECURITY ON THE MOVE; NOTES; 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS; THE LEGAL MINEFIELD; THE LAYERED SECURITY MODEL; DETERMINING THE SECURITY RISK; PERSONAL RESPONSIBILITY; 5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS.
|
505 |
8 |
|
|a Benefits of bring-your-ownsecurity drawbacks; plug-in-security; virtual workspaces; assessing the benefits; notes; 6 safety training for the workforce; how big is the iceberg?; it's as if no one cares; the time has come for action; 7 ceos in the dock; smartphones are minicomputers; senior managers are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot threat; lack of security; malware lunch pad; blended threats; 9 password security; enforcing stronger password policies; password security does not have to be a pain; higher risk groups.
|
505 |
8 |
|
|a Types of attacks10 encryption is sometimes not enough.; risk-risk trade-offs; the effects of encryption; notes; 11 nfc: another one for the acronym soup; 12 network security when going mobile; nac=rip and replace; nac=another brick in the wall; nac=the security orchestrator; 13 improving your network and application assurance strategy; the oday menace; tiered approach; notes; 14 mobile rules for security officers: a 'case study'; mobile rules; useful links; reasearch and articles; organisations; blogs; other.
|
520 |
|
|
|a According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics include: personal mobile devices at work; passwords; data encryption.
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Mobile computing.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Informatique mobile.
|
650 |
|
7 |
|a COMPUTERS
|x Data Transmission Systems
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Vendor Specific.
|2 bisacsh
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
650 |
|
7 |
|a Mobile computing.
|2 fast
|0 (OCoLC)fst01024221
|
710 |
2 |
|
|a IT, BCS The Chartered Institute for.
|
776 |
0 |
|
|z 9781780171111
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781780171111/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL832563
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10582844
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 8872009
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7311917
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21438156
|
994 |
|
|
|a 92
|b IZTAP
|