The art of protecting mobile data Muthoga Kioni

By: Series: Crime, Courts & InvestigationsPublication details: Nairobi The Standard Group Wednesday, February 11, 2009Description: p.11; [Crime, Courts & Investigations] The Standard, Februrary 11, 2009Subject(s): Summary: Mobile computing has put lots of corporate information in electronic format. A dramatic upsurge of laptop theft has been witnessed in Nairobi. Data stolen in the process could be used to commit identity theft. These scenarios demand a layered approach to mobile computing where data security is also included.
Reviews from LibraryThing.com: List(s) this item appears in: FIT - CRYPTOGRAPHY AND NETWORK SECURITY | @ILAB - MST (Books - Combined)
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Mobile computing has put lots of corporate information in electronic format. A dramatic upsurge of laptop theft has been witnessed in Nairobi. Data stolen in the process could be used to commit identity theft. These scenarios demand a layered approach to mobile computing where data security is also included.

There are no comments on this title.

to post a comment.

© Strathmore University Library Madaraka Estate Ole, Sangale Road P. O. Box 59857 00200 City Square Nairobi Kenya
Tel.: (+254) (0)703 034000/(0)703 034200/(0)703 034300 Fax.: (+254) (0)20-607498