Buy Mobile Security: How to Secure, Privatize, and Recover Your Devices
close menu
Bookswagon
search
My Account
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology Books > Computer security > Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile Security: How to Secure, Privatize, and Recover Your Devices


     0     
5
4
3
2
1



International Edition


X
About the Book

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens. Key Features Learn how mobile devices are monitored and the impact of cloud computing Understand the attacks hackers use and how to prevent them Keep yourself and your loved ones safe online Book DescriptionThe threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don't manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security is growing on a daily basis and this guide may just be the help you need. Mobile Security: How to Secure, Privatize, and Recover Your Devices will teach you how to recognize, protect against, and recover from hacking attempts and outline the clear and present threats to your online identity posed by the use of a mobile device. In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.What you will learn Discover how mobile devices are monitored Identify threats to you, and your family s privacy Ensure the safety of your device and identity Recover from being hacked Deal with a compromised or lost device Learn in detail about device support and insurance in detail Who this book is forMobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

Table of Contents:
Table of Contents



    About the Author :
    Tim Speed is an IBM Senior Certified Systems Architect with IBM Software Services for Collaboration. In that capacity, he is responsible for designing, implementing, and supporting various engagements with IBM customers. Mr. Speed has been an IBM employee for over 18 years in a variety of networking, technical, hardware, and software support and consulting positions. He has been working with Lotus Notes for over 20 years focusing on administration roles and infrastructure. He also has international experience with working on infrastructure engagements in Spain, Bahamas, Japan, Hong Kong, Singapore, Malaysia, the UK, and Indonesia. Darla Nykamp is an Internal Auditor with IBM, joining the company in 1996 after more than a decade in the IT industry. She has focused on software design and development, security policy design and implementation, business controls and compliance, and served as IBM's first Global Privacy Delivery Leader.In her spare time, Darla has earned a Doctorate of Law, a Masters Degree in International Business Management, a Bachelors Degree in Computer Science, and certifications in the security and privacy professions. Mari Heiser is an IBM and Open Group master certified architect with over 20 years architecture, governance, risk, compliance, and technical management experience in networks and web technologies, specializing in security, compliance, and Service Oriented Architecture (SOA). She is also an expert in Identity and Access Management, Cloud, Security Analytics, and leads the IBM internal Information Security Community of Practice for the Americas. Ms. Heiser's industry specific experience has been concentrated in banking, manufacturing, distribution, bio-tech, education and aerospace industries Joseph Anderson is an IBM Certified Managing Consultant from the IBM Collaboration Solutions Software Team. Joseph has worked with IBM Notes/Domino, IBM Connections, IBM Sametime, IBM WebSphere Portal and IBM Quickr since the early 1990's, primarily as a Jaya Nampalli is an Managing Consultant for IBM Software Services for Collaboration. She is responsible for the development of high quality solutions for IBM customers in response to specific business requirements. She is a technical lead developer working on solution feasibility studies or requirements analysis, application assessments, custom design, implementation, testing, and system integration. She works with clients to facilitate the execution of information strategies that are innovative and well aligned based on a client's business needs. At IBM, she considers working on the IBM Centennial project as one of the highlights of her career. Jaya has worked on both small- and large-scale projects. Jaya stays current with web technology advances and other IBM product offerings by self-education and collaborating with other IBM team members. Jaya has been an IBM employee for over 12 and half years.


    Best Sellers


    Product Details
    • ISBN-13: 9781849693608
    • Publisher: Packt Publishing Limited
    • Publisher Imprint: Packt Publishing Limited
    • Edition: Revised edition
    • No of Pages: 242
    • ISBN-10: 1849693609
    • Publisher Date: 02 Apr 2023
    • Binding: Digital (delivered electronically)
    • Language: English
    • Returnable: N


    Similar Products

    Add Photo
    Add Photo

    Customer Reviews

    REVIEWS      0     
    Click Here To Be The First to Review this Product
    Mobile Security: How to Secure, Privatize, and Recover Your Devices
    Packt Publishing Limited -
    Mobile Security: How to Secure, Privatize, and Recover Your Devices
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    Mobile Security: How to Secure, Privatize, and Recover Your Devices

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept


      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!