"Mobile Computing," Chapter 18: Security issues in mobile computing
This chapter discusses different techniques to secure information over mobile computing environments.
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
![]() |
|
![]() |
![]() |
![]() |
Mobile computing with networked information systems help increase productivity and operational efficiency. This however, comes at a price. Mobile computing with networked information systems increases the risks for sensitive information supporting critical functions in the organization which are open to attacks. This chapter discusses different techniques to secure information over mobile computing environments.
Read the rest of Security issues in mobile computing in this PDF.
Excerpted from Mobile Computing by Asoke Talukder and Roopa Yavagal (ISBN: 0071477330).
Copyright © 2006, McGraw-Hill Professional. All rights reserved.
Start the conversation
0 comments