9781284059274-1284059278-Wireless and Mobile Device Security: Print Bundle (Jones & Barlett Learning Information Systems Security & Assurance)

Wireless and Mobile Device Security: Print Bundle (Jones & Barlett Learning Information Systems Security & Assurance)

ISBN-13: 9781284059274
ISBN-10: 1284059278
Edition: 1
Author: Jim Doherty
Publication date: 2015
Publisher: Jones & Bartlett Learning
Format: Paperback 394 pages
FREE US shipping on ALL non-marketplace orders
Marketplace
from $4.99 USD
Buy

From $4.99

Book details

ISBN-13: 9781284059274
ISBN-10: 1284059278
Edition: 1
Author: Jim Doherty
Publication date: 2015
Publisher: Jones & Bartlett Learning
Format: Paperback 394 pages

Summary

Wireless and Mobile Device Security: Print Bundle (Jones & Barlett Learning Information Systems Security & Assurance) (ISBN-13: 9781284059274 and ISBN-10: 1284059278), written by authors Jim Doherty, was published by Jones & Bartlett Learning in 2015. With an overall rating of 4.3 stars, it's a notable title among other Network Security (Security & Encryption, Networking & Cloud Computing) books. You can easily purchase or rent Wireless and Mobile Device Security: Print Bundle (Jones & Barlett Learning Information Systems Security & Assurance) (Paperback) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.34.

Description

The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how to best protect their assets. Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book