CHAPTER

Mobile computing devices like smartphones, cell phones, netbooks, and laptops, add to the vulnerability of information systems by creating new points of entry into information systems. There are over 200,000 apps for Apple mobile computing devices and 80,000 apps for Droid-based devices. ................
................