
books.apple.com/us/book/bring-your-own-device-security-policy-compliance-framework/id6743963287
Preview meta tags from the books.apple.com website.
Linked Hostnames
4- 20 links towww.apple.com
- 11 links tobooks.apple.com
- 1 link tolocate.apple.com
- 1 link tosupport.apple.com
Thumbnail

Search Engine Appearance
Bring Your Own Device Security Policy Compliance Framework
Proliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. The influx of these devices has created information security challenges within organizations, further exacerbated with employees’ inconsistent adherence…
Bing
Bring Your Own Device Security Policy Compliance Framework
Proliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. The influx of these devices has created information security challenges within organizations, further exacerbated with employees’ inconsistent adherence…
DuckDuckGo

Bring Your Own Device Security Policy Compliance Framework
Proliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. The influx of these devices has created information security challenges within organizations, further exacerbated with employees’ inconsistent adherence…
General Meta Tags
14- titleBring Your Own Device Security Policy Compliance Framework by Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah & Tutut Herawan on Apple Books
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1, viewport-fit=cover
- applicable-devicepc,mobile
Open Graph Meta Tags
12- og:titleBring Your Own Device Security Policy Compliance Framework
- og:descriptionComputers & Internet · 2025
- og:site_nameApple Books
- og:urlhttps://books.apple.com/us/book/bring-your-own-device-security-policy-compliance-framework/id6743963287
- og:imagehttps://is1-ssl.mzstatic.com/image/thumb/Publication211/v4/b9/f8/64/b9f864ae-3bf5-fe05-1dee-da993e54d4de/cover.jpg/1200x630wz.png
Twitter Meta Tags
6- twitter:titleBring Your Own Device Security Policy Compliance Framework
- twitter:descriptionComputers & Internet · 2025
- twitter:site@AppleBooks
- twitter:cardsummary_large_image
- twitter:imagehttps://is1-ssl.mzstatic.com/image/thumb/Publication211/v4/b9/f8/64/b9f864ae-3bf5-fe05-1dee-da993e54d4de/cover.jpg/1200x600wz.png
Link Tags
15- canonicalhttps://books.apple.com/us/book/bring-your-own-device-security-policy-compliance-framework/id6743963287
- iconhttps://books.apple.com/assets/images/favicon/favicon-books-48-a8eb8171a8d912ed29d99e7a134953d3.png
- preconnecthttps://amp-api.books.apple.com
- preconnecthttps://is1-ssl.mzstatic.com
- preconnecthttps://is2-ssl.mzstatic.com
Links
33- https://books.apple.com/us/author/rathika-palanisamy/id1805360805
- https://books.apple.com/us/book-series/information-systems-engineering-and-management/id1750924167
- https://books.apple.com/us/book/bring-your-own-device-security-policy-compliance-framework/id6743963287?see-all=other-books-in-book-series
- https://books.apple.com/us/book/demystifying-ai-and-ml-for-cyber-threat-intelligence/id6751143300
- https://books.apple.com/us/book/exploring-the-impact-of-extended-reality-xr/id6745744632