Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
131
Chapter 10
Security Implications of
BringYour Own Device,
ITConsumerization, and
Managing User Choices
Sandy Bacik
Bring your own device (BYOD) or bring your own technology (BYOT), two of the newer acro-
nyms within information technology (IT) has unleashed the age of IT consumerization. With the
proliferation of various types of mobile devices and the consumerization of IT, corporate networks
are becoming more challenging to manage and are more at-risk every day. e days of a static,
one-size-fits-all policy applied to company-owned assets are over. Today, information security
needs to understand what devices are trying to connect to their ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498