The Essential BYOD Books for Mobile and IT Administrators

Solutions Review compiles the essential books on BYOD that any mobile or IT administrator needs to add to their reading list.

Whether hardcover or digital, books are an excellent source for people looking to learn about a specific field of technology, and BYOD is no exception. We’ve listed the top BYOD books that you should add to your reading list. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in BYOD management and security.

Looking for more information on mobile security and mobility management vendors? Our free Buyer’s Guide contains profiles on the top vendors in the mobility management field and their key features and functions. It also lists questions you should ask yourself and prospective vendors before you choose a solution.

BYOD For You: The Guide to Bring Your Own Device to Work

by Daniel J. Lohrmann

“BYOD for You: The Guide to Bring Your Own Device to Work is the perfect e-book to quickly provide the answers to your specific work-related situation. You’ll learn the basics of BYOD and the terms you need to know; how you can address the company policy, including legal, financial, security, privacy, and ethical concerns associated with BYOD; and proactive steps you can take with your iPhone, iPad, Blackberry, Windows, or Android-enabled devices to help your career.”


Cisco ISE for BYOD and Secure Unified Access

by Aaron Woland and Jamey Heary

“With this book, you will gain an understanding of ISE configuration, such as identifying users, devices, and security posture […] drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors offer in-depth coverage of the complete lifecycle for all relevant ISE solutions, making this book a cornerstone resource whether you’re an architect, engineer, operator, or IT manager.”


Enterprise Mobility Management: Everything You Need to Know About MDM, MAM, and BYOD

by Jack Madden and Brian Madden

“In this book, you will learn how MDM really works, what it does well, and what its limitations are; why IT’s mindset has to evolve from locking down devices and networks to making data and applications accessible in a safe way; why the real challenge isn’t personal devices, but mixing work and personal apps and data on a single device, regardless of whether they’re personally-owned or corporate-deployed; how mobile app management works, and why (despite challenges) it may be the best approach for keeping corporate data secure.”


Enterprise Mobility Suite Managing BYOD and Company-Owned Devices

by Yuri Diogenes and Jeff Gilbert

“Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management experts at Microsoft show you how to systematically help protect employee privacy and corporate assets without compromising productivity. You’ll find best practices, step-by-step guidance, and real-world scenarios for every stage of planning, design, deployment, and administration.”


Enterprise Mobility with App Management, Office 365, and Threat Mitigation: Beyond BYOD

by Yuri Diogenes, Jeff Gilbert, and Robert Mazzoli

“Protect both corporate assets and employee privacy, so your people can be fully productive from any device, anywhere. Learn how to use Microsoft Intune to manage applications to satisfy your unique requirements, make the most of Mobile Device Management (MDM) for Office 365, and defend on-premises resources with Microsoft Advanced Threat Analytics (ATA).”


Mobile Access Safety: Beyond BYOD

by Dominique Assing and Stéphane Calé 

“The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers, and how to face them.”


Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.

Looking for more info on the benefits of mobility management? You should check out our free Mobility Management Buyer’s Guide. We profile the top vendors in the mobility management field, list their key capabilities, and determine our Bottom Line for each.

Check us out on Twitter for the latest in Enterprise Mobility news and developments!

Daniel Hein

Dan is a tech writer who writes about Enterprise Cloud Strategy and Network Monitoring for Solutions Review. He graduated from Fitchburg State University with a Bachelor's in Professional Writing. You can reach him at dhein@solutionsreview.com
Daniel Hein