Here's part of the content - you would like to know it all? Delve into this book today!..... : Bring your own device (BYOD) is a business policy of employees bringing personally owned mobile devices to their place of work and using those devices to access privileged company resources such as email, file servers and databases as well as their personal applications and data.
...WPA2-Enterprise is the only level of wireless security that provides all three forms of wireless security: (1) over-the-air encryption, to ensure traffic is protected in transit, (2) user authentication, to ensure an authorized user is accessing the network, and (3) network authentication, to ensure the user is connecting to the real network (and not an evil twin network).
... Due to security issues, the employees often do not have true full control over their devices, as the company they work for would need to ensure that proprietary and private information is secure at all times.
...Inverse-BYOD increases enterprise network security by decreasing Internet-based risks, improves network performance by offloading high-bandwidth traffic (e. g. video) to less/non-managed local networks, improves user access to Internet content (typically because of less filtering for risks, larger connections, and lower latency), improves mobility (assuming the enterprise offers some Internet-facing services like email or remote desktops or a web portal), and improves morale since employees can use the latest commercial technology to be effective.
There is absolutely nothing that isn't thoroughly covered in the book. It is straightforward, and does an excellent job of explaining all about Bring your own device in key topics and material. There is no reason to invest in any other materials to learn about Bring your own device. You'll understand it all.
Inside the Guide: Bring your own device, Word processor, Web browser, Security Technical Implementation Guide, Mobile security, Mobile phone, Mobile device management, Mobile application management, Media player (application software), Evil twin (wireless networks), End node problem, Encryption, Deep packet inspection, Database, Bandwidth (computing), Backup