Apples iPhone, iPad, and the popular BlackBerry devices have ushered in the era of mobile devices for the masses. Over the last few years, tens of millions of smartphones (running operating systems such as iPhone, Google Android, Palms Web OS, Windows Phone, Symbian, and Blackberry) have been shipped annually, and this trend is expected to continue to grow, quite significantly, into the future. As these phones and devices get more powerful, they begin to act a lot like regular computers: they can run a variety of applications (banking/payment applications, email, contacts, enterprise applications like CRM) and they can store a lot of critical data (emails, account numbers, contacts, financial account information, and more). Yet the overwhelming majority of them have not been properly protected against the wide range of security threats. As cell phones are becoming more like pocket-sized computers, they are more vulnerable to viruses, Trojan horses, and worms. Businesses clearly recognize the threat: three-quarters of surveyed corporations have a security policy covering cell phone calling and four out of five IT professionals surveyed believe that cell phones are equally or more vulnerable to interception than email. A survey by security firm Trend Micro Incorporated suggested that only 23 percent of smartphone users enable security software already loaded onto their phones and 44 percent think surfing the Internet on their phone is as safe or safer than doing so on a desktop computer -- even with no security software. Mobile Device Security for Dummies is the answer to this growing digital threat to the IT administrators and the millions of networks and users who have no security against this ground swell of adoption. Many companies lack policies for using smartphones for business and personal use. This book provides a practical, fast-track approach to securing mobile devices. It discusses important topics including specific hacker protection, loss/theft protection, backing-up and restoring data, granular application access control and enforcement with VPN, Enterprise management, sample policies, and several useful and interesting case studies where large companies have deployed enterprise network protection for mobile devices.

  • Introduction(第1頁)
    • About This Book(第1頁)
    • Foolish Assumptions(第2頁)
    • Conventions Used in This Book(第2頁)
    • How This Book Is Organized(第3頁)
    • Icons Used in This Book(第4頁)
    • Where to Go from Here(第5頁)
  • Part I: Living Securely in the Smart World(第7頁)
    • Chapter 1: What’s So Smart About a Phone, Anyway?(第9頁)
    • Chapter 2: Why Do I Care? The Mobile Device Threat(第33頁)
    • Chapter 3: Planning for Mobile Devices in the Enterprise(第57頁)
  • Part II: Implementing Enterprise Mobile Security(第77頁)
    • Chapter 4: Creating Mobile Device Security Policies(第79頁)
    • Chapter 5: Managing and Controlling Devices(第105頁)
    • Chapter 6: Conforming to Corporate Compliance Policies(第127頁)
  • Part III: Securing Smart Device Access(第147頁)
    • Chapter 7: Securing Data in Transit with VPNs(第149頁)
    • Chapter 8: Connecting to Wi-Fi Networks(第177頁)
  • Part IV: Securing Each Smart Device(第187頁)
    • Chapter 9: Device Security Component Overview(第189頁)
    • Chapter 10: Hacker Protection and Enforceable Encryption(第209頁)
    • Chapter 11: Protecting Against Loss and Theft(第233頁)
    • Chapter 12: Educating Users about Backing Up Data(第247頁)
    • Chapter 13: Securing Mobile Applications(第263頁)
  • Part V: The Part of Tens(第273頁)
    • Chapter 14: Top Ten Online Information Sources(第275頁)
    • Chapter 15: Top Ten Mobile Security Vendors(第279頁)
  • Index(第283頁)
紙本書 NT$ 1120
NT$ 784

還沒安裝 HyRead 3 嗎?馬上免費安裝~
QR Code