"Mobile Computing," Chapter 18: Security issues in mobile computing

This chapter discusses different techniques to secure information over mobile computing environments.

 

 Mobile computing with networked information systems help increase productivity and operational efficiency. This however, comes at a price. Mobile computing with networked information systems increases the risks for sensitive information supporting critical functions in the organization which are open to attacks. This chapter discusses different techniques to secure information over mobile computing environments.

 Read the rest of Security issues in mobile computing in this PDF.

Excerpted from Mobile Computing by Asoke Talukder and Roopa Yavagal (ISBN: 0071477330).

Copyright © 2006, McGraw-Hill Professional. All rights reserved.

 

This was first published in September 2006

Dig deeper on Mobile Device Security

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchConsumerization

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close