Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Explaining how mobile devices can create backdoor security threats, this title specifies immediate actions you can take to defend against these threats. Highlighting the risks inherent when mobilizing data, it supplies a proven methodology for identifying, analyzing, and evaluating these risks.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.