O'Reilly logo

CSA Guide to Cloud Computing by Brian Honan, Jim Reavis, Raj Samani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Secure Cloud for Mobile Computing

Abstract

The devices we use to access cloud resources is also changing, none more so than our dependency on mobile devices. In this chapter, we will look at the threats to mobile computing for the cloud.

Keywords

Android; Apps; BYOD; iOS; Mobile
Information in this chapter
▪ Mobile top threats
▪ Addressing the threat: mobile components for consideration
Throughout the book, we have referenced multiple sources that reference the growth in the number of devices that each of us are or will be using in the future. This of course means that we are likely to witness considerably more devices beyond the traditional computing devices such as computers and mobile phones. Such adoption of nontraditional computing devices ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required