Wednesday, April 20, 2005
Pocket PC security
"The following areas should be covered in a security policy:
- Authentication onto the device
- Remote destruction and disabling
- Backup and restore
- Storage cards
- Access to applications
- Information transfer methods
- Device deployment
Pocket PC, May 2005, p. 67-70.