(0) items

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Mobile Access Safety Beyond BYOD,9781848214354
This item qualifies for

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Mobile Access Safety Beyond BYOD

by ; ; ;


Pub. Date:
List Price: $100.95

Buy New Textbook

Usually Ships in 3-4 Business Days



Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $86.14

Questions About This Book?

What version or edition is this?
This is the 1st edition with a publication date of 3/4/2013.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically only the book itself is included.


Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them.


1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility.
2.Threats and Attacks.
3. Technological Countermeasures.
4. Technological Countermeasures for Remote Access.
5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary.

About the Authors

Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise.
Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.

Table of Contents



Chapter 1 – An ordinary in the life of M. Rowley, or the dangers of virtualization and mobility.

Chapter 2 – Threats and attacks

Chapter 3 – Technological countermeasures

Chapter 4 – Technological countermeasures for remote access

Chapter 5 – What should have been done for M. Rowley’s day to be ordinary


Appendix 1 – Recap of security solutions

Appendix 2 – Glossary

Please wait while the item is added to your cart...