PDA Security
Because of their small, portable nature, PDAs present a unique security dilemma. This title is suitable for PSA technicians and IT professionals who need to understand and solve this challenge. It explores PDA security issues and details to establish privacy in the hand-held medium. It also explores hacking problems.
1133490520
PDA Security
Because of their small, portable nature, PDAs present a unique security dilemma. This title is suitable for PSA technicians and IT professionals who need to understand and solve this challenge. It explores PDA security issues and details to establish privacy in the hand-held medium. It also explores hacking problems.
43.95 In Stock
PDA Security

PDA Security

PDA Security

PDA Security

Paperback

$43.95 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Because of their small, portable nature, PDAs present a unique security dilemma. This title is suitable for PSA technicians and IT professionals who need to understand and solve this challenge. It explores PDA security issues and details to establish privacy in the hand-held medium. It also explores hacking problems.

Product Details

ISBN-13: 9780071424905
Publisher: McGraw-Hill Professional Publishing
Publication date: 07/25/2003
Series: One Off
Pages: 404
Product dimensions: 6.08(w) x 9.06(h) x 1.06(d)

Table of Contents

FOREWORDACKNOWLEDGMENTS INTRODUCTION SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE Incorporating Handhelds into the Enterprise PDAs in the Enterprise The Power Resource Guide to Understanding Where Security Must be Achieved SECTION TWO: HANDHELDS IN THE ENTERPRISE When a Handheld Becomes Information Technology's Problem The Components of a Measured IT Response The How-To Guide SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE Understanding Handheld Security is Largely About the Operating System Hacking Threats and Mitigations SECTION FOUR: GRADUATION Handhelds Where Does Device Security Go from Here? INDEX
From the B&N Reads Blog

Customer Reviews