Chapter 4

Secure Cloud for Mobile Computing

Abstract

The devices we use to access cloud resources is also changing, none more so than our dependency on mobile devices. In this chapter, we will look at the threats to mobile computing for the cloud.

Keywords

Android; Apps; BYOD; iOS; Mobile
Information in this chapter
▪ Mobile top threats
▪ Addressing the threat: mobile components for consideration
Throughout the book, we have referenced multiple sources that reference the growth in the number of devices that each of us are or will be using in the future. This of course means that we are likely to witness considerably more devices beyond the traditional computing devices such as computers and mobile phones. Such adoption of nontraditional computing devices ...

Get CSA Guide to Cloud Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.