Chapter 1

What’s So Smart About a Phone, Anyway?

In This Chapter

arrow Taking a look at different mobile devices

arrow Getting up to speed on mobile operating system platforms

arrow Exploring data connections

arrow Examining the applications that run on mobile devices

arrow Putting the mobile device security deployment in order

arrow Introducing the AcmeGizmo case study

The late 2000s and early 2010s ushered in a new era of mobility in the enterprise. Prior to this time, truly productive mobility required users to have a laptop, a mobile phone, and possibly a personal digital assistant (PDA) in order to be as productive offsite as they would be at the office. The rise of the smartphone, however, has changed all of that. Now users can get as much done with a device that fits in their pocket as they could when three separate devices were required to accomplish the same tasks. With tablets reaching widespread adoption as ...

Get Mobile Device Security For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.