"Mobile Computing," Chapter 18: Security issues in mobile computing

This chapter discusses different techniques to secure information over mobile computing environments.

 

 Mobile computing with networked information systems help increase productivity and operational efficiency. This however, comes at a price. Mobile computing with networked information systems increases the risks for sensitive information supporting critical functions in the organization which are open to attacks. This chapter discusses different techniques to secure information over mobile computing environments.

 Read the rest of Security issues in mobile computing in this PDF.

Excerpted from Mobile Computing by Asoke Talukder and Roopa Yavagal (ISBN: 0071477330).

Copyright © 2006, McGraw-Hill Professional. All rights reserved.

 

This was last published in September 2006

Dig Deeper on Enterprise mobile security

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close