Chapter 10. Creating a Secured Mobile Communications Configuration
Introduction to Secured Mobile Computing
In recent years, mobile computers have become the fastest growing computer category. Consumer and business users are replacing their desktop computers with equally powerful mobile computers. In some vertical markets, palmtops or touch-screen PCs are even replacing laptops.
With an increasing number of mobile and at-home employees, it becomes more difficult to maintain network security and the confidentiality of corporate information. Windows Vista provides the latest wireless security protocols and improved layers of protection that safeguard the corporate network while providing secure remote access to documents and programs.
Users can ...
Get Microsoft Windows Vista Management and Administration now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.