首页 | 本学科首页   官方微博 | 高级检索  
     


Securing the mobile device
Authors:Bruce Potter
Abstract:Much of the information available about wireless security revolves around securing the actual wireless communications; insuring the confidentiality, integrity, and availability of the data on a wireless network. However, what often goes overlooked is the wireless device itself. These devices are wireless for a reason; they are mobile and generally designed to be used in any location a user has access to a network. Phones, laptops, and PDA's are all purchased primarily for their mobility, not their stunning good looks.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号