O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mobile Device Management

Bringing your own device to work is not totally new. Many employees have been using their own devices, which they themselves purchased, for years. Many companies run software to check a user's computer before the user is permitted to connect to a corporate network. The growth of the home office changed the rules of corporate computing. IBM's policies provide a good example of how home offices can be integrated into the modern workplace; many of the authors of this book have not had a dedicated office space for years. Some companies will allow users to connect with an employee-owned computer from their home, while others will allow only a corporate computer to connect to a corporate network.

One very important point to understand ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required