The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors. Outlines differences in mobile devices versus PCs Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors Summarizes the tools and techniques for implementing enterprise countermeasures Maps mobile to common security compliances including PCI, HIPAA, and CJIS Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss
Navigate the Mobile Landscape with Confidence and Create a Mobile Strategy That Wins in the Market Place Mobile Strategy gives IT leaders the ability to transform their business by offering all the guidance they need to navigate this complex landscape, leverage its opportunities, and protect their investments along the way. IBM’s Dirk Nicol clearly explains key trends and issues across the entire mobile project lifecycle. He offers insights critical to evaluating mobile technologies, supporting BYOD, and integrating mobile, cloud, social, and big data. Throughout, you’ll find proven best practices based on real-world case studies from his extensive experience with IBM’s enterprise customers. Coverage includes • Understanding the profound implications and challenges of consumerized IT in the mobile space • Uncovering powerful new opportunities to drive value from mobile technology • Transforming “systems of record” to “systems of engagement” that fully reflect context and intelligence • Identifying proven patterns for delivering common mobile capabilities in operations, commerce, collaboration, and marketing • Managing security threats related to lost/stolen devices, insecure Wi-Fi, and built-in cameras • Choosing mobile data protection, security, and management options: wrappers, containers, virtualization, mobile Software Development Kits (SDKs), virtual private networks (VPNs), Mobile Device Management (MDM), Mobile Application Management (MAM), and anti-malware • Handling the “app store” distribution model and managing updates • Using mobile middleware to support multiple platforms and back-end connectivity with less complexity • Building and integrating high-quality mobile apps—and getting useful customer feedback to improve them • Addressing international considerations and emerging markets • Mastering methodologies for successfully and rapidly executing mobile projects • Converging mobile, cloud, social, and big data into a single high-value IT delivery platform
This book examines two main topics, namely, Wireless Networking and Mobile Data Management. It is designed around a course the author began teaching to senior undergraduate and master’s students at the Department of Computer Science & Engineering of the Indian Institute of Technology Kanpur. The first part of the book, consisting of eight chapters, including the introduction, focuses exclusively on wireless networking aspects. It begins with cellular communication systems, which provided the foundation of wireless networking principles. Three subsequent chapters are devoted to the Global System for Mobile communication (GSM), Wireless Local Area Network (WLAN), Bluetooth, infrared (IR), ZigBee and 6LoWPAN protocols. There is also a chapter on routings in ad hoc networks, an area that is currently being intensively researched due to its potential applications in areas of vehicular network, traffic management, tactical and military systems. Furthermore, the book discusses mobile operating systems and wireless network application level protocols such as Wireless Application Protocols (WAP), Mobile IP and Mosh. The second part highlights mobile data management. It addresses the issues like location management, the importance of replication and caching in mobile environments, the concept of broadcast disk and indexing in air, storage systems for sharing data in mobile environments, and building smart environments. Given that the design of algorithms is the key to applications in data management; this part begins with a chapter on the type of paradigm shift that has been introduced in the design of algorithms, especially due to asymmetry in mobile environments. Lastly, the closing chapter of the book explores smart environments, showing the readers how wireless technology and mobile data management can be combined to provide optimum comfort for human life. Though the book has been structured as a monograph, it can be used both as a textbook and as a reference material for researchers and developers working in the area.
This book constitutes the refereed proceedings of the First International Conference on Mobile Data Access, MDA'99, held in Hong Kong, China, in December 1999. The 20 revised full papers presented were carefully selected from a total of 39 submissions. The papers are organized in sections on wireless networks and communications, transaction processing in mobile environments, ubiquitous information services, mobile data replication and caching, and mobility and location management.
|Author||: Subhransu Sekhar Dash,Swagatam Das,Bijaya Ketan Panigrahi|
|Release Date||: 2017-12-28|
|ISBN 10||: 9811055203|
|Pages||: 679 pages|
The book is a collection of best papers presented in International Conference on Intelligent Computing and Applications (ICICA 2016) organized by Department of Computer Engineering, D.Y. Patil College of Engineering, Pune, India during 20-22 December 2016. The book presents original work, information, techniques and applications in the field of computational intelligence, power and computing technology. This volume also talks about image language processing, computer vision and pattern recognition, machine learning, data mining and computational life sciences, management of data including Big Data and analytics, distributed and mobile systems including grid and cloud infrastructure.
Presents a combined view of content and wireless technologies useful to both the industry and academia Offers a good mix of theory and practice to understand the internal working of the wireless/mobile content delivery networks Bridges the gap between the wireless and content research communities Focuses not only on the latest technology enablers for speedier content delivery in the mobile Internet, but also on how to integrate them to provide workable end-to-end solutions
|Publisher||: Institute of Electrical & Electronics Engineers(IEEE)|
|Release Date||: 2002|
|Pages||: 2477 pages|
|Author||: Vladimir Berman|
|Release Date||: 2005|
|Pages||: 186 pages|
Serving as a basic reference for graduate and advanced undergraduates, this book details the engineering principles underlying mobile computing. It is the first systematic explanation of mobile communications as a discipline in itself, containing exercises, projects, and solutions.
|Author||: Hari Balakrishnan|
|Release Date||: 1998|
|Pages||: 406 pages|