The Essential Mobility Management Books for IT Administrators
Solutions Review compiles the most essential books on mobility management that any IT administrator needs to add to their reading list.
An increasing number of mobile devices and mobile solutions are being deployed in the business world. Mobility management solutions allow companies to maintain control over their mobile devices by delivering security policies and monitoring mobile solutions. Books, whether hardcover or digital, are an excellent source for people looking to learn about a specific field of technology, and mobility management is no exception. We’ve listed the top mobility management books that you should add to your reading list. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the field of mobility management.
Looking for more information on enterprise mobility management? Our free Buyer’s Guide contains profiles on the top vendors in the mobility management field and their key features and functions. It also lists questions you should ask yourself and prospective vendors before you choose a solution.
Enterprise Mobility Management: Everything You Need to Know About MDM, MAM, and BYOD
by Jack Madden and Brian Madden
“In this book, you’ll will learn how MDM really works, what it does well, and what its limitations are; why IT’s mindset has to evolve from locking down devices and networks to making data and applications accessible in a safe way; why the real challenge isn’t personal devices, but mixing work and personal apps and data on a single device, regardless of whether they’re personally-owned or corporate-deployed; how mobile app management works, and why (despite challenges) it may be the best approach for keeping corporate data secure.”
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
by Yuri Diogenes and Jeff Gilbert
“Learn how to use Microsoft’s breakthrough Enterprise Mobility Suite to help securely manage all your BYOD and company-owned mobile devices: Windows, iOS, and Android. Two of the leading mobile device management experts at Microsoft show you how to systematically help protect employee privacy and corporate assets without compromising productivity. You’ll find best practices, step-by-step guidance, and real-world scenarios for every stage of planning, design, deployment, and administration.”
Enterprise Wireless Mobility Management
“Enterprise Wireless Mobility Management (WMM) is a business strategy that most companies are starting to define, because all employees have at least one mobile device (mobile phones, smart phones, tablets,…) and at least 30% of them are company owned property and by 2015 is expected to be 60% since most companies are moving to a mobile workforce. With the increasing number of company owned devices companies need to control their data on a User/Devices/Billing perspective.”
Hacking Exposed Mobile: Security Secrets & Solutions
by Neil Bergman, Mike Stanfield, Jason Rouse, and Joel Scambray
“Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps.[…] This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.”
Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World
“Explaining how mobile devices can create backdoor security threats, Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World specifies immediate actions you can take to defend against these threats. It begins by introducing and defining the concepts essential to understanding the security threats to contemporary mobile devices, and then takes readers through all the policy, process, and technology decisions that must be made to create an effective security strategy.”
Mobile Device Security for Dummies
by Rich Campagna, Subbu Iyer, and Ashwin Krishnan
“Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate information.”
Mobile Strategy: How Your Company Can Win by Embracing Mobile Technologies
“Mobile Strategy gives IT leaders the ability to transform their business by offering all the guidance they need to navigate this complex landscape, leverage its opportunities, and protect their investments along the way. IBM’s Dirk Nicol clearly explains key trends and issues across the entire mobile project lifecycle. He offers insights critical to evaluating mobile technologies, supporting BYOD, and integrating mobile, cloud, social, and big data. Throughout, you’ll find proven best practices based on real-world case studies from his extensive experience with IBM’s enterprise customers.”
Mobilized: An Insider’s Guide to the Business and Future of Connected Technology
“SC Moatti […] gives businesses and professionals simple ways to thrive in this modern day “gold rush.” More than a book on technology, this is a book about human nature and what matters most to us. Moatti shows that because mobile products have become extensions of ourselves, we expect from them what we wish for ourselves: an attractive body, a meaningful life, and a growing repertoire of skills. She has created an all-encompassing formula that makes it easy for any business to develop a strategy for creating winning mobile products.”
Selecting Mobile Device Management Systems: Practical Functions, Tips and Checklist
“The (e)book provides independent information about different features and functions supported in modern mobile device management systems, provides practical tips for decision makers what to consider when choosing a mobile device (and / or app) management system, gives an overview of vendors and provides a checklist what to consider when you write your own request for information or request for proposal.”
Wireless and Mobile Device Security
“Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.”
Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.
Looking for more info on the benefits of mobility management? You should check out our free Mobility Management Buyer’s Guide. We profile the top vendors in the mobility management field, list their key capabilities, and determine our Bottom Line for each.
Check us out on Twitter for the latest in Enterprise Mobility news and developments!