Cargando…

Mobile computing : securing your workforce.

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics include: personal mo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: IT, BCS The Chartered Institute for
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Swindon : British Informatics Society, 2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn769928298
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 120102s2011 enk ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d YDXCP  |d N$T  |d OCLCQ  |d COO  |d OCLCQ  |d OCLCF  |d DEBSZ  |d OCLCQ  |d UMI  |d E7B  |d DOS  |d DEBBG  |d OCLCQ  |d CNNOR  |d Z5A  |d MERUC  |d OCLCQ  |d CEF  |d STF  |d AU@  |d OCLCQ  |d DKC  |d OCLCQ  |d UAB  |d UKAHL  |d OCLCQ  |d VT2  |d VLY  |d BRF  |d EYM  |d OCLCO  |d OCLCQ 
019 |a 808341560  |a 810455378  |a 981614426  |a 981867208  |a 1006304267  |a 1058125543  |a 1083483993  |a 1153033809  |a 1162557363  |a 1179690116  |a 1192328530  |a 1194730647  |a 1240524083 
020 |a 9781780171128  |q (electronic bk.) 
020 |a 1780171129  |q (electronic bk.) 
020 |a 9781780171135  |q (Kindle) 
020 |a 1780171137  |q (Kindle) 
020 |z 9781780171111 
020 |z 1780171110 
029 1 |a AU@  |b 000050155596 
029 1 |a AU@  |b 000050542824 
029 1 |a AU@  |b 000053284627 
029 1 |a CHNEW  |b 000619417 
029 1 |a DEBBG  |b BV040887645 
029 1 |a DEBSZ  |b 378296868 
029 1 |a DEBSZ  |b 397219199 
029 1 |a NZ1  |b 15122704 
035 |a (OCoLC)769928298  |z (OCoLC)808341560  |z (OCoLC)810455378  |z (OCoLC)981614426  |z (OCoLC)981867208  |z (OCoLC)1006304267  |z (OCoLC)1058125543  |z (OCoLC)1083483993  |z (OCoLC)1153033809  |z (OCoLC)1162557363  |z (OCoLC)1179690116  |z (OCoLC)1192328530  |z (OCoLC)1194730647  |z (OCoLC)1240524083 
037 |a CL0500000165  |b Safari Books Online 
050 4 |a QA76.59 .M458 2011 
072 7 |a COM  |x 020000  |2 bisacsh 
072 7 |a COM  |x 043060  |2 bisacsh 
082 0 4 |a 004.6  |2 22 
049 |a UAMI 
245 0 0 |a Mobile computing :  |b securing your workforce. 
260 |a Swindon :  |b British Informatics Society,  |c 2011. 
300 |a 1 online resource (54 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Copyright; CONTENTS; FOREWORD; 1 EQUIPPING EMPLOYEES, MAXIMISING POTENTIAL; WHAT IS A 'BETTER CONNECTED' WORKFORCE?; 'PROSUMERISATION'; WHAT ARE THE BUSINESS DRIVERS?; LOOKING FORWARD; ENSURING SAFE END-USER ADOPTION; CONCLUSION; 2 CONSUMER DEVICES IN THE WORKPLACE: A BEST-PRACTICE SECURITY APPROACH; PUTTING THE RIGHT TOOLS IN PLACE; 3 SECURITY ON THE MOVE; NOTES; 4 MOBILE SECURITY: MINIMISING RISK, MAXIMISING AWARENESS; THE LEGAL MINEFIELD; THE LAYERED SECURITY MODEL; DETERMINING THE SECURITY RISK; PERSONAL RESPONSIBILITY; 5 DELIVERING SECURITY ON EMPLOYEES' PERSONAL LAPTOPS. 
505 8 |a Benefits of bring-your-ownsecurity drawbacks; plug-in-security; virtual workspaces; assessing the benefits; notes; 6 safety training for the workforce; how big is the iceberg?; it's as if no one cares; the time has come for action; 7 ceos in the dock; smartphones are minicomputers; senior managers are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot threat; lack of security; malware lunch pad; blended threats; 9 password security; enforcing stronger password policies; password security does not have to be a pain; higher risk groups. 
505 8 |a Types of attacks10 encryption is sometimes not enough.; risk-risk trade-offs; the effects of encryption; notes; 11 nfc: another one for the acronym soup; 12 network security when going mobile; nac=rip and replace; nac=another brick in the wall; nac=the security orchestrator; 13 improving your network and application assurance strategy; the oday menace; tiered approach; notes; 14 mobile rules for security officers: a 'case study'; mobile rules; useful links; reasearch and articles; organisations; blogs; other. 
520 |a According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics include: personal mobile devices at work; passwords; data encryption. 
504 |a Includes bibliographical references. 
588 0 |a Print version record. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Data encryption (Computer science) 
650 0 |a Mobile computing. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Informatique mobile. 
650 7 |a COMPUTERS  |x Data Transmission Systems  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Vendor Specific.  |2 bisacsh 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Mobile computing.  |2 fast  |0 (OCoLC)fst01024221 
710 2 |a IT, BCS The Chartered Institute for. 
776 0 |z 9781780171111 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781780171111/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBL - Ebook Library  |b EBLB  |n EBL832563 
938 |a ebrary  |b EBRY  |n ebr10582844 
938 |a YBP Library Services  |b YANK  |n 8872009 
938 |a YBP Library Services  |b YANK  |n 7311917 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21438156 
994 |a 92  |b IZTAP