The art of protecting mobile data Muthoga Kioni
Series: Crime, Courts & InvestigationsPublication details: Nairobi The Standard Group Wednesday, February 11, 2009Description: p.11; [Crime, Courts & Investigations] The Standard, Februrary 11, 2009Subject(s): Summary: Mobile computing has put lots of corporate information in electronic format. A dramatic upsurge of laptop theft has been witnessed in Nairobi. Data stolen in the process could be used to commit identity theft. These scenarios demand a layered approach to mobile computing where data security is also included.
Reviews from LibraryThing.com:
List(s) this item appears in:
FIT - CRYPTOGRAPHY AND NETWORK SECURITY
|
@ILAB - MST (Books - Combined)
No physical items for this record
Mobile computing has put lots of corporate information in electronic format. A dramatic upsurge of laptop theft has been witnessed in Nairobi. Data stolen in the process could be used to commit identity theft. These scenarios demand a layered approach to mobile computing where data security is also included.
There are no comments on this title.
Log in to your account to post a comment.