Chapter Download

"Mobile Computing," Chapter 18: Security issues in mobile computing


    Requires Free Membership to View

 Mobile computing with networked information systems help increase productivity and operational efficiency. This however, comes at a price. Mobile computing with networked information systems increases the risks for sensitive information supporting critical functions in the organization which are open to attacks. This chapter discusses different techniques to secure information over mobile computing environments.

 Read the rest of Security issues in mobile computing in this PDF.

Excerpted from Mobile Computing by Asoke Talukder and Roopa Yavagal (ISBN: 0071477330).

Copyright © 2006, McGraw-Hill Professional. All rights reserved.


This was first published in September 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: