Cart
Free US shipping over $10
Proud to be B-Corp

Mobile Security: How to Secure, Privatize, and Recover Your Devices Tim Speed

Mobile Security: How to Secure, Privatize, and Recover Your Devices By Tim Speed

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Tim Speed


$7.68
Condition - Very Good
Only 1 left

Faster Shipping

Get this product faster from our US warehouse

Mobile Security: How to Secure, Privatize, and Recover Your Devices Summary

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Tim Speed

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

About Tim Speed

Tim Speed is an IBM Senior Certified Systems Architect with IBM Software Services for Collaboration. In that capacity, he is responsible for designing, implementing, and supporting various engagements with IBM customers. Mr. Speed has been an IBM employee for over 18 years in a variety of networking, technical, hardware, and software support and consulting positions. He has been working with Lotus Notes for over 20 years focusing on administration roles and infrastructure. He also has international experience with working on infrastructure engagements in Spain, Bahamas, Japan, Hong Kong, Singapore, Malaysia, the UK, and Indonesia. Darla Nykamp is an Internal Auditor with IBM, joining the company in 1996 after more than a decade in the IT industry. She has focused on software design and development, security policy design and implementation, business controls and compliance, and served as IBM's first Global Privacy Delivery Leader.In her spare time, Darla has earned a Doctorate of Law, a Masters Degree in International Business Management, a Bachelors Degree in Computer Science, and certifications in the security and privacy professions. Mari Heiser is an IBM and Open Group master certified architect with over 20 years architecture, governance, risk, compliance, and technical management experience in networks and web technologies, specializing in security, compliance, and Service Oriented Architecture (SOA). She is also an expert in Identity and Access Management, Cloud, Security Analytics, and leads the IBM internal Information Security Community of Practice for the Americas. Ms. Heiser's industry specific experience has been concentrated in banking, manufacturing, distribution, bio-tech, education and aerospace industries Joseph Anderson is an IBM Certified Managing Consultant from the IBM Collaboration Solutions Software Team. Joseph has worked with IBM Notes/Domino, IBM Connections, IBM Sametime, IBM WebSphere Portal and IBM Quickr since the early 1990's, primarily as a Jaya Nampalli is an Managing Consultant for IBM Software Services for Collaboration. She is responsible for the development of high quality solutions for IBM customers in response to specific business requirements. She is a technical lead developer working on solution feasibility studies or requirements analysis, application assessments, custom design, implementation, testing, and system integration. She works with clients to facilitate the execution of information strategies that are innovative and well aligned based on a client's business needs. At IBM, she considers working on the IBM Centennial project as one of the highlights of her career. Jaya has worked on both small- and large-scale projects. Jaya stays current with web technology advances and other IBM product offerings by self-education and collaborating with other IBM team members. Jaya has been an IBM employee for over 12 and half years.

Additional information

CIN1849693609VG
9781849693608
1849693609
Mobile Security: How to Secure, Privatize, and Recover Your Devices by Tim Speed
Used - Very Good
Paperback
Packt Publishing Limited
2013-09-10
242
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Mobile Security: How to Secure, Privatize, and Recover Your Devices