The purpose of this paper is to survey and expand on the techniques put forth by other authors (1,2,3) to keep laptops 'safe' while they are outside the protection afforded by a properly configured and maintained network. It is not what security professionals do when they travel because simply put...