Für diesen Artikel ist leider kein Bild verfügbar.

Mobile Device Management and Strategy

Buch | Hardcover
320 Seiten
2015
Auerbach Pubn (Verlag)
978-1-4822-3268-4 (ISBN)
67,30 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique threats. The diversity of available devices, operating systems, carrier-provided services, and mobile applications present additional security challenges to the confidentiality, integrity, and availability of information. This book discusses the baseline of standard security requirements for mobile computing. It examines the US government s Mobile Security Architecture that incorporates security and privacy by design to develop a standard Mobile Device management system that is applicable in most all corporate and organizational situations."

Leighton Johnson has presented computer security, cyber security, and forensics classes and seminars all across the United States and Europe. He has over 35 years experience in Computer Security, Cyber Security, Software Development, and Communications Equipment Operations & Maintenance. Primary focus areas include computer security, information operations and assurance, incident response and forensics investigations, software system development life cycle focused on modeling and simulation systems, systems engineering and integration activities, database administration, business process and data modeling. He has taught CISSP, CISA, CISM, Security +, CAP, DIACAP, ISSEP, Anti-Terrorism, Digital and Network Forensics, and Risk Management courses around the US over the past 7 years. He taught Digital and Network Forensics courses at Augusta State University. He has presented at ISRM-NA 2012, ISRM-NA 2011, ISRM-EU 2011, EuroCACS 2010, ISMC 2007, ISMC 2006, CyberCrime Summit 2007 and INFOSEC WORLD 2005 conferences and delivered multiple presentations for military and civilian conferences for customers and clients worldwide. He has provided online presentations for ISACA in Identity Management, Security Architecture and Cyber trends over the past 2 years. He is a member of the CSA CloudSIRT working group developing the model for collaboration among cloud providers, responders and users; the CSA Security-as-a-Service working group developing the definitions for SECaaS requirements and models, as well as a member of the IEEE Education working groups on Cloud Security and on Secure Software Code. He recently served as a member of the IS Alliance NIST joint working group on VOIP SCAP security. He is a contributing author to the Encyclopedia of Information Assurance, where he contributed two chapters on Security Incident Response and Configuration Management. "

Introduction to Mobile Computing. Strategies for Mobile Computing Management. Devices that Need Management. Mobile Device Management Mobile Application Management. Identity and Access Management. Data Management. Security Concerns for Mobile Computing. Mobile Device Control Architecture. Mitigation Methods.

Erscheint lt. Verlag 1.12.2017
Verlagsort Oakville
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Software Entwicklung Mobile- / App-Entwicklung
Informatik Weitere Themen Smartphones / Tablets
Technik
Wirtschaft Betriebswirtschaft / Management Logistik / Produktion
ISBN-10 1-4822-3268-5 / 1482232685
ISBN-13 978-1-4822-3268-4 / 9781482232684
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich