O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Users and Mobile Device Management

The world of computing is changing, again. This history of computing is more than just personal computers. It was not too many years ago that punch cards were being used and there were jobs just for people to enter data. Today, we are living in a truly mobile world, complete with a variety of devices that we use for talking, playing games, sending messages, and even work. The important term for this chapter is Bring Your Own Device (BYOD) to work. This chapter will focus on the impact of BYOD on the workplace. BYOD brings several impacts to you, as follows:

  • Many companies are installing what is known as Mobile Device Management (MDM) solutions. This solution is a part of a holistic corporate security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required