Secure Cloud for Mobile Computing
The devices we use to access cloud resources is also changing, none more so than our dependency on mobile devices. In this chapter, we will look at the threats to mobile computing for the cloud.
KeywordsAndroid; Apps; BYOD; iOS; Mobile
Information in this chapter
▪ Mobile top threats
▪ Addressing the threat: mobile components for consideration
Throughout the book, we have referenced multiple sources that reference the growth in the number of devices that each of us are or will be using in the future. This of course means that we are likely to witness considerably more devices beyond the traditional computing devices such as computers and mobile phones. Such adoption of nontraditional computing devices ...
Get CSA Guide to Cloud Computing now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.