Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World (Hardcover)

Stephen Fried

  • 出版商: Auerbach Publication
  • 出版日期: 2010-06-16
  • 定價: $2,800
  • 售價: 9.0$2,520
  • 語言: 英文
  • 頁數: 302
  • 裝訂: Hardcover
  • ISBN: 1439820163
  • ISBN-13: 9781439820162
  • 相關分類: 資訊安全
  • 立即出貨 (庫存=1)



As each generation of portable electronic devices and storage media becomes smaller, higher in capacity, and easier to transport, it’s becoming increasingly difficult to protect the data on these devices while still enabling their productive use in the workplace. Explaining how mobile devices can create backdoor security threats, Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World specifies immediate actions you can take to defend against these threats. It begins by introducing and defining the concepts essential to understanding the security threats to contemporary mobile devices, and then takes readers through all the policy, process, and technology decisions that must be made to create an effective security strategy.


Highlighting the risks inherent when mobilizing data, the text supplies a proven methodology for identifying, analyzing, and evaluating these risks. It examines the various methods used to store and transport mobile data and illustrates how the security of that data changes as it moves from place to place. Addressing the technical, operational, and compliance issues relevant to a comprehensive mobile security policy, the text:




  • Provides methods for modeling the interaction between mobile data and mobile devices—detailing the advantages and disadvantages of each
  • Explains how to use encryption and access controls to protect your data
  • Describes how to layer different technologies to create a resilient mobile data protection program
  • Provides examples of effective mobile security policies and discusses the implications of different policy approaches
  • Highlights the essential elements of a mobile security business case and provides examples of the information such proposals should contain
  • Reviews the most common mobile device controls and discusses the options for implementing them in your mobile environment


Securing your mobile data requires the proper balance between security, user acceptance, technology capabilities, and resource commitment. Supplying real-life examples and authoritative guidance, this complete resource walks you through the process of creating an effective mobile security program and provides the understanding required to develop a customized approach to securing your information.




- 提供了建模移動數據和移動設備之間交互作用的方法,詳細介紹了每種方法的優點和缺點
- 解釋了如何使用加密和訪問控制來保護您的數據
- 描述了如何使用不同技術層來建立一個具有彈性的移動數據保護計劃
- 提供了有效的移動安全策略示例,並討論了不同策略方法的影響
- 強調了移動安全業務案例的基本要素,並提供了這些提案應包含的信息示例
- 回顧了最常見的移動設備控制措施,並討論了在移動環境中實施這些措施的選項