O'Reilly logo

Microsoft Windows Vista Management and Administration by Scott Chimner, James Walker, Andrew Abbate

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Creating a Secured Mobile Communications Configuration

Introduction to Secured Mobile Computing

In recent years, mobile computers have become the fastest growing computer category. Consumer and business users are replacing their desktop computers with equally powerful mobile computers. In some vertical markets, palmtops or touch-screen PCs are even replacing laptops.

With an increasing number of mobile and at-home employees, it becomes more difficult to maintain network security and the confidentiality of corporate information. Windows Vista provides the latest wireless security protocols and improved layers of protection that safeguard the corporate network while providing secure remote access to documents and programs.

Users can ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required