Swipe to navigate through the chapters of this book
Mobile devices and bring-your-own-devices (BYODs) are major trends impacting how enterprises think about their own IT. Thanks to rapid developments in computing power and power consumption, a supercomputer from the 1970s fits into our pockets. With multi-processing, graphical user interface, and gigabytes of memory all at our fingertips, 24 hours a day, the face of IT is changing almost daily. These devices come in all shapes and sizes, including notebooks, tablets, sub-notebooks, "phablets," music players, and, of course, cellular phones.
Please log in to get access to this content
To get access to this content you need the following product:
Murugiah Souppaya and Karen Scarfone, National Institute of Standards and Technology Special Publication 800–124 Revision 1, June 2013.
Mobile Security Reference Architecture, Version 1.0, Federal CIO Council and Department of Homeland Security National Protection and Program Directorate Office of Cybersecurity and Communications Federal Network Resilience, May 23, 2013.
- Enterprise Cybersecurity for Mobile and BYOD
Scott E. Donaldson
Stanley G. Siegel
Chris K. Williams
- Sequence number
- Chapter number
- Chapter 7