Mobile Access Safety: Beyond BYOD.
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more t...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Somerset
John Wiley & Sons, Incorporated
2013
|
Ausgabe: | 1st ed |
Schriftenreihe: | Iste
|
Schlagworte: | |
Zusammenfassung: | Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (184 pages) |
ISBN: | 9781118577981 9781848214354 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044050037 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781118577981 |9 978-1-118-57798-1 | ||
020 | |a 9781848214354 |c Print |9 978-1-84821-435-4 | ||
035 | |a (ZDB-30-PAD)EBC1124007 | ||
035 | |a (ZDB-89-EBL)EBL1124007 | ||
035 | |a (ZDB-38-EBR)ebr10658477 | ||
035 | |a (OCoLC)828299039 | ||
035 | |a (DE-599)BVBBV044050037 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 621.384 | |
100 | 1 | |a Assing, Dominique |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile Access Safety |b Beyond BYOD. |
250 | |a 1st ed | ||
264 | 1 | |a Somerset |b John Wiley & Sons, Incorporated |c 2013 | |
264 | 4 | |c © 2013 | |
300 | |a 1 online resource (184 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Iste | |
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context | ||
650 | 4 | |a Mobile communication systems -- Security measures | |
650 | 4 | |a Mobile computing -- Security measures | |
650 | 4 | |a Mobile computing | |
650 | 0 | 7 | |a Mobiles Endgerät |0 (DE-588)7689895-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Mobiles Endgerät |0 (DE-588)7689895-7 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Calé, Stéphane |e Sonstige |4 oth | |
700 | 1 | |a Cale, Stephane |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Assing, Dominique |t Mobile Access Safety : Beyond BYOD |
912 | |a ZDB-30-PAD |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029456882 |
Datensatz im Suchindex
_version_ | 1804177067070193664 |
---|---|
any_adam_object | |
author | Assing, Dominique |
author_facet | Assing, Dominique |
author_role | aut |
author_sort | Assing, Dominique |
author_variant | d a da |
building | Verbundindex |
bvnumber | BV044050037 |
collection | ZDB-30-PAD ZDB-38-ESG |
ctrlnum | (ZDB-30-PAD)EBC1124007 (ZDB-89-EBL)EBL1124007 (ZDB-38-EBR)ebr10658477 (OCoLC)828299039 (DE-599)BVBBV044050037 |
dewey-full | 621.384 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.384 |
dewey-search | 621.384 |
dewey-sort | 3621.384 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03387nmm a2200505zc 4500</leader><controlfield tag="001">BV044050037</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118577981</subfield><subfield code="9">978-1-118-57798-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781848214354</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-84821-435-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC1124007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1124007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10658477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)828299039</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044050037</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.384</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Assing, Dominique</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile Access Safety</subfield><subfield code="b">Beyond BYOD.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Somerset</subfield><subfield code="b">John Wiley & Sons, Incorporated</subfield><subfield code="c">2013</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (184 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Iste</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobiles Endgerät</subfield><subfield code="0">(DE-588)7689895-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobiles Endgerät</subfield><subfield code="0">(DE-588)7689895-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Calé, Stéphane</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cale, Stephane</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Assing, Dominique</subfield><subfield code="t">Mobile Access Safety : Beyond BYOD</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029456882</subfield></datafield></record></collection> |
id | DE-604.BV044050037 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:42:11Z |
institution | BVB |
isbn | 9781118577981 9781848214354 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029456882 |
oclc_num | 828299039 |
open_access_boolean | |
physical | 1 online resource (184 pages) |
psigel | ZDB-30-PAD ZDB-38-ESG |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | John Wiley & Sons, Incorporated |
record_format | marc |
series2 | Iste |
spelling | Assing, Dominique Verfasser aut Mobile Access Safety Beyond BYOD. 1st ed Somerset John Wiley & Sons, Incorporated 2013 © 2013 1 online resource (184 pages) txt rdacontent c rdamedia cr rdacarrier Iste Description based on publisher supplied metadata and other sources Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context Mobile communication systems -- Security measures Mobile computing -- Security measures Mobile computing Mobiles Endgerät (DE-588)7689895-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Mobiles Endgerät (DE-588)7689895-7 s Computersicherheit (DE-588)4274324-2 s DE-604 Calé, Stéphane Sonstige oth Cale, Stephane Sonstige oth Erscheint auch als Druck-Ausgabe Assing, Dominique Mobile Access Safety : Beyond BYOD |
spellingShingle | Assing, Dominique Mobile Access Safety Beyond BYOD. Mobile communication systems -- Security measures Mobile computing -- Security measures Mobile computing Mobiles Endgerät (DE-588)7689895-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7689895-7 (DE-588)4274324-2 |
title | Mobile Access Safety Beyond BYOD. |
title_auth | Mobile Access Safety Beyond BYOD. |
title_exact_search | Mobile Access Safety Beyond BYOD. |
title_full | Mobile Access Safety Beyond BYOD. |
title_fullStr | Mobile Access Safety Beyond BYOD. |
title_full_unstemmed | Mobile Access Safety Beyond BYOD. |
title_short | Mobile Access Safety |
title_sort | mobile access safety beyond byod |
title_sub | Beyond BYOD. |
topic | Mobile communication systems -- Security measures Mobile computing -- Security measures Mobile computing Mobiles Endgerät (DE-588)7689895-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Mobile communication systems -- Security measures Mobile computing -- Security measures Mobile computing Mobiles Endgerät Computersicherheit |
work_keys_str_mv | AT assingdominique mobileaccesssafetybeyondbyod AT calestephane mobileaccesssafetybeyondbyod |