PDA Security : Incorporating Handhelds into the Enterprise
David Melnick, Inc. Asynchrony Solutions, Mark Dinman, Alexander Muratov
- 出版商: McGraw-Hill Education
- 出版日期: 2003-07-25
- 售價: $1,710
- 貴賓價: 9.5 折 $1,625
- 語言: 英文
- 頁數: 378
- 裝訂: Paperback
- ISBN: 0071424903
- ISBN-13: 9780071424905
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$2,610$2,480 -
$460$391 -
$680$646 -
$1,600$1,568 -
$460$363 -
$420$328 -
$590$466 -
$690$538 -
$750$713 -
$750$675 -
$620$527 -
$560$504 -
$450$356 -
$720$569 -
$550$468 -
$390$304 -
$420$328 -
$580$493 -
$720$612 -
$880$695 -
$650$553 -
$620$484 -
$450$351 -
$420$328 -
$850$723
相關主題
商品描述
* Let an IT security expert help you assess the PDA threat to your business
* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks
* Maximize and protect the value of increasingly capable personal digital assistants to your organization
DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS.
PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you’re an information technology or business executive, the time is right to size up the unique security risks these small, portable devices pose. This essential primer for those deploying, managing or using PDAs in the workplace will help you understand and address the challenges presented by this emerging set of technologies. Written by respected IT security experts, PDA Security, shows you how to:
* Assess the level of threat posed by PDAs in your organization
* Develop a measured and enforceable policy response to minimize the risk
* Understand the technical issues and defend against the threats PDAs pose to privacy, theft of sensitive information, system corruption, and other issues of network and data misuse
* Analyze secure solutions for all major handhelds -- Palm, PocketPC, and RIM
* Examine a case study on securing Palm for the work environment
* Learn why solutions almost always involve the operating system
* Discover what White-Hat Hacking reveals about vulnerabilities
* Find profitable ways to integrate PDAs into business plans and networks, while downsizing risks
* Get an insider’s preview of the future of handhelds -- the PCs of the early twenty-first century
With a Foreword by Rebecca Bace, internationally renowned intrusion-detection and network-security specialist and former member of the United States Department of Defense National Security Agency (NSA).
For ongoing news and original content on PDA security, related Web sites, and a calendar of related events, visit www.pdasecurity-book.com
Contents
FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
SECTION
ONE: INTRODUCTION TO PDA SECURITY IN THE
ENTERPRISE
Incorporating Handhelds into the
Enterprise
PDAs in the
Enterprise
The Power Resource Guide to Understanding
Where Security Must be Achieved
SECTION TWO: HANDHELDS IN THE
ENTERPRISE
When a Handheld Becomes Information
Technologys Problem
The Components of a Measured IT
Response
The How-To Guide
SECTION THREE:
THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND
MORE
Understanding Handheld Security is Largely About the
Operating System
Hacking Threats and
Mitigations
SECTION FOUR:
GRADUATION
Handhelds
Where Does
Device Security Go from
Here?
INDEX