Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…

Smartphones, personal digital assistants (PDAs), and other mobile devices that employ a variety of data communication and storage technologies, such as e-maillPIM synchronization software, infrared data transmission, and removable data storage, are at risk for increasing security threats to corporate data. This book details how mobile devices can become a backdoor to the enterprise. It specifies immediate actions that can be taken by an IT security manager to defend against these threats and the regulatory and compliance issues relevant to a comprehensive handheld security policy.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.
Smartphones, personal digital assistants (PDAs), and other mobile devices that employ a variety of data communication and storage technologies, such as e-maillPIM synchronization software, infrared data transmission, and removable data storage, are at risk for increasing security threats to corporate data. This book details how mobile devices can become a backdoor to the enterprise. It specifies immediate actions that can be taken by an IT security manager to defend against these threats and the regulatory and compliance issues relevant to a comprehensive handheld security policy.