Advertisement
Online Test Banks
Score higher
See Online Test Banks
eLearning
Learning anything is easy
Browse Online Courses
Mobile Apps
Learning on the go
Explore Mobile Apps
Dummies Store
Shop for books and more
Start Shopping

Administration & Professional Networking

View:  
Sorted by:  

Enterprise Mobile Device Security: Spyware Dangers

Spyware on the enterprise mobile device not only consumes bandwidth and computing resources but exposes the enterprise to liability issues, security risks and limits productivity. But how does it get on [more…]

Enforceable Encryption on Enterprise Mobile Devices

One way to counter spyware on your enterprise mobile devices is with enforceable encryption — software that uses encryption to obfuscate critical data residing on the device. Extensible memory on the devices [more…]

Enterprise Mobile Device Security: Personal Device Loss or Theft Precautions

If your IT policy allows personal mobile devices to access network resources, prevention of loss or theft and remediation of any damage is likely to be part of your responsibilities. Here are some precautions [more…]

Enterprise Mobile Device Security: Personal Apple iOS Device Protection

If your enterprise allows personal devices to connect to the corporate network, you are likely to be looked to for advice and information regarding protecting those devices. Features and recommendations [more…]

Enterprise Mobile Device Security: Carrier-Provided Voice Encryption

With the widespread adoption of mobile devices comes a tendency to use them to conduct mission-critical business, opening up voice communications as a security vector. That makes the mobile devices a very [more…]

Deploying Enterprise-Wide Loss and Theft Mobile Device Protection

If you need to deploy loss and theft protection on hundreds or thousands of mobile devices across your enterprise, you need to identify the platforms you want to support in your enterprise and then shortlist [more…]

Enterprise Mobile Device Application Security on BlackBerry Devices

As an enterprise administrator, you can control what applications can be deployed on your employees’ BlackBerry devices. The BlackBerry Enterprise Server [more…]

Application Security on Apple iOS Mobile Devices

Mobile device application developers use the sandboxing capability of Apple iOS to ensure the security of user data and to ensure that their applications don’t share data with other apps installed on the [more…]

Application Security on Android Mobile Devices

Android has a number of security features built into its operating system which help protect your mobile device applications. On Android, by default, no application has the permissions needed to perform [more…]

Enterprise Mobile Device: Personal Apple Device Backup and Restore

There are practical things you must tell your employees about mobile device security. You can pass this information along to your Apple device users regarding backing up, restoring and data transfer. [more…]

Enterprise Mobile Device: Personal Android Device Backup and Restore

Mobile devices contain plenty of vital personal and corporate data, including e-mails, contacts, call logs. Responsible ownership requires data backups and knowledge about restoring data. As an administrator [more…]

Enterprise Mobile Device: Personal Nokia Device Backup and Restore

Educating your employees on security includes training them on how and why to perform regular data backups for their Nokia devices. Use of that backed up data to perform restores and data transfers is [more…]

Corporate Solutions for Mobile Device Backup and Restore

The options for backing up and restoring data vary from one device to another. Most OS and device vendors offer software applications to facilitate the backup and restore features on their own devices. [more…]

Enterprise Mobile Device Security: 10 Top Information Websites

To secure your mobile devices, you must keep abreast of the latest types of threats and solutions. What better place to go and find this late-breaking information than the Internet? Of course, surfing [more…]

Enterprise Mobile Device: Personal Blackberry Device Backup and Restore

Education of your mobile device carrying employees on methods of backing up, restoring and transferring data helps protect them and corporate resources. Here is information on management of Blackberry [more…]

Enterprise Mobile Device: Personal Windows Phone Backup and Restore

Education of your mobile device carrying employees on methods of backing-up, restoring and transferring data helps protect them and corporate resources. Here is information on management of Windows Phone [more…]

Network Basics: OSI Transport Layer

The Open Systems Interconnection (OSI) Transport layer is the layer where you’ll find the most well-known networking protocols: TCP (normally paired with IP) and SPX [more…]

Basic Network Building Blocks

All networks, large or small, require specialized network hardware to make them work. Small or large, all networks are built from the following basic building blocks: [more…]

Basic Benefits of Networking

If the truth be told, computer networks are a pain to set up. Because the benefits of having a network make the difficulty of setting one up worthwhile. You don’t have to be a Ph.D. to understand the benefits [more…]

Network Basics: Clients and Servers

The network computer that contains the hard drives, printers, and other resources that are shared with other network computers is called a server. This term comes up repeatedly, so you have to remember [more…]

Network Basics: Dedicated Servers and Peers

There are two basic types of networks: client/server and peer to peer. The relationships, whether dedicated servers or peer relationships amongst the hardware determines the network type. [more…]

Network Basics: Geographic Size

Networks come in all sizes and shapes. In fact, it’s common to categorize networks based on the geographical size they cover, as described in the following list: [more…]

Network Basics: Network Topology

The term network topology refers to the shape of how the computers and other network components are connected to each other. There are several different types of network topologies, each with advantages [more…]

Network Basics: Complex Network Topologies

Physicists say that the universe is expanding, and network administrators know they’re right. A simple bus or star topology is suitable only for small networks, with a dozen or so computers. But small [more…]

Network Basics: OCI Session and Presentation Layers

The Session and Presentation layers of the standard Open Systems Interconnection (OSI) model are where network functions begin moving from physical to electronic and software matters. [more…]

Advertisement

Sign Up for RSS Feeds

Computers & Software
Win an iPad Mini! Enter to win now.

Inside Dummies.com

Dummies.com Sweepstakes

Win an iPad Mini. Enter to win now!