Learn more Shop now Shop now Shop now Shop now Shop now Shop now Learn More Shop now Learn more Click Here Shop Kindle New Album - Foo Fighters Shop now Shop Women's Shop Men's

Customer reviews

3.8 out of 5 stars
3.8 out of 5 stars
5 star
4 star
3 star
2 star
1 star

There was a problem filtering reviews right now. Please try again later.

on 26 December 2012
This book provides high level view of various aspects of mobile coputing.

Good read to gain awareness about this emerging topic.
0Comment| 2 people found this helpful. Was this review helpful to you?YesNoReport abuse
on 20 May 2013
good guide for mobile apps developers and designers as it provide a comprehensive tips of ideas for developers. This was good to have delivered free of charge as well by the BCS.
0Comment| One person found this helpful. Was this review helpful to you?YesNoReport abuse
on 19 September 2012
"Mobile Computing - Securing your Workforce" is an e-book that comprises 14 short essays on the subject of mobile computing in the workplace. Contributors include senior professionals in industry and commerce, the public sector and individual members of the BCS.

Each essay comprises only a few pages, summarising the main points that the author wishes to make in their knowledge area, in a book that is less than 50 pages in total. The essays span a two year period commencing October 2009 through to October 2011, with most being written in the spring/summer of 2011. Despite the passage of time, the book remains topical. It covers our love of mobile devices, and provides sound advice and guidance for both consumers and the hard-pressed ICT Department in the balance to get the best return out of the mobile devices, without compromising corporate security standards.

The brevity of each article allows the author to convey only an overview of the subject matter; however this does mean that it is easy to dip in, and read an essay completely in a 10 minute break.

The best essays cover the topical issues surrounding equipping employees to maximise their potential, looking at the governance issues in mobile computing, the emergence of the software virus and malware in this sector and of course the "Bring Your Own Device [to Work]" (BYOD) explosion. Some essays will be more interesting than others, depending on the reader's area of interest. One or two essays are particularly specialist, and perhaps don't sit as well in this book as the majority - considering the general awareness mission to which the book is pitching.

If nothing else the reader should enjoy this wide-ranging cornucopia of material, my particular favourites being "NFC: another one for the Acronym Soup" - that's Near Field Communication in case you were wondering - and a witty yet thought provoking piece from Jane Grafton teasingly promoted as a case study of Mobile Rules for Security Officers.

The "Useful Links" in the appendix covers research and articles that the reader can follow up on, provides the web addresses of three key security organisations in the marketplace, a handful of blogs to while away the time plus an article from the BCS on top security tips. And a little gem to finish with points the reader to a website containing the top 500 worst passwords of all time!
0Comment| One person found this helpful. Was this review helpful to you?YesNoReport abuse
on 1 November 2014
Great book and value - speedy delivery too
0Comment|Was this review helpful to you?YesNoReport abuse

Need customer service? Click here

Sponsored Links

  (What is this?)