Mobile Device Management and Strategy
Auerbach Pubn (Verlag)
978-1-4822-3268-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Leighton Johnson has presented computer security, cyber security, and forensics classes and seminars all across the United States and Europe. He has over 35 years experience in Computer Security, Cyber Security, Software Development, and Communications Equipment Operations & Maintenance. Primary focus areas include computer security, information operations and assurance, incident response and forensics investigations, software system development life cycle focused on modeling and simulation systems, systems engineering and integration activities, database administration, business process and data modeling. He has taught CISSP, CISA, CISM, Security +, CAP, DIACAP, ISSEP, Anti-Terrorism, Digital and Network Forensics, and Risk Management courses around the US over the past 7 years. He taught Digital and Network Forensics courses at Augusta State University. He has presented at ISRM-NA 2012, ISRM-NA 2011, ISRM-EU 2011, EuroCACS 2010, ISMC 2007, ISMC 2006, CyberCrime Summit 2007 and INFOSEC WORLD 2005 conferences and delivered multiple presentations for military and civilian conferences for customers and clients worldwide. He has provided online presentations for ISACA in Identity Management, Security Architecture and Cyber trends over the past 2 years. He is a member of the CSA CloudSIRT working group developing the model for collaboration among cloud providers, responders and users; the CSA Security-as-a-Service working group developing the definitions for SECaaS requirements and models, as well as a member of the IEEE Education working groups on Cloud Security and on Secure Software Code. He recently served as a member of the IS Alliance NIST joint working group on VOIP SCAP security. He is a contributing author to the Encyclopedia of Information Assurance, where he contributed two chapters on Security Incident Response and Configuration Management. "
Introduction to Mobile Computing. Strategies for Mobile Computing Management. Devices that Need Management. Mobile Device Management Mobile Application Management. Identity and Access Management. Data Management. Security Concerns for Mobile Computing. Mobile Device Control Architecture. Mitigation Methods.
Erscheint lt. Verlag | 1.12.2017 |
---|---|
Verlagsort | Oakville |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Software Entwicklung ► Mobile- / App-Entwicklung | |
Informatik ► Weitere Themen ► Smartphones / Tablets | |
Technik | |
Wirtschaft ► Betriebswirtschaft / Management ► Logistik / Produktion | |
ISBN-10 | 1-4822-3268-5 / 1482232685 |
ISBN-13 | 978-1-4822-3268-4 / 9781482232684 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich