The NON-Geek Guide to wireless SECURITY

Course

Distance

£ 19 + VAT

Description

  • Type

    Course

  • Methodology

    Distance Learning

A reliable and quick entry-level booklet for managers. Do you know anyone who uses a wireless laptop, a PDA or a cellphone? They need this book!

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Description
A reliable and quick entry-level booklet for managers. Do you know anyone who uses a wireless laptop, a PDA or a cellphone? They need this book!

Program

In today's wireless world, this eBook (follow this link for contents and author details ) is essential reading. As the number of wireless devices increases worldwide, so they become more attractive to attackers. And it's the individual user who has to protect them.
The NON-Geek guide identifies, in non-technical language, the key threats for each technology, and identifies the simple, practical solutions that you can deploy. It also provides dynamic links to the products and services that will help in the fight to protect your data and your communications against attackers.
If you use a Cellphone, PDA or wireless laptop, you need this eBook today.
Author: Alan Calder
Publisher: IT Governance Publishing
ISBN 10: 1905356013
ISBN 13: 9781905356010
Published: March 2005
Format: eBook

Availability: Download immediately

"Ilike that this book is not pretentious, it says what it wants to accomplish. Easily structured book and easy to read without too much jargon or if needed, it's nicely explained for the non-geek. It particularly addressed the dangers with PDAs and handheld computers (e.g., Chapter 4) that are loved by managers and used extensively. Throughout the book information is provided pointing out where the risks are with these gadgets and why the executive might represent the weakest link in the chain, thereby endanngering the security policy, compliance and reputation of the firm (e.g., losing his non-encrypted gadget with sooooo important info on it.... if it gets into the wrong hands, what then?)." Professor Urs E Gattiker, WebUrb.dk (see Information Security this Week (Denmark) (ISSN:1600-1869) )

The NON-Geek Guide to wireless SECURITY

£ 19 + VAT