Mobile security requires each computing device on a network to comply with certain standards before network access is granted to prevent exfiltration (data theft) and virus infection at network entry points. Mobile devices are especially vulnerable to loss and theft. Through wireless connections, mobile devices can access networks that may not be secure. More than ever, mobile encryption strategies are critical to network security. This book is a very solid guide for both technical and non-technical people who need to know how to deal with all the various types of devices being connected to their network and how to secure and encrypt mobile devices to acheieve a sound security strategy.