找回密码
 注册
搜索
热搜: java php web
查看: 529|回复: 1

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in t

[复制链接]
发表于 2009-12-20 22:13:42 | 显示全部楼层 |阅读模式
本帖最后由 石头 于 2009-12-20 22:19 编辑



作者:Daniel V. Hoffman
出版日期:April 30, 2007
出版社:其它
页数:312
ISBN:978-0470127544
文件格式:PDF

Product DescriptionToday, it is almost impossibleto do business without a cell phone and a BlackBerry or PDA. Thesedevices are the lifeline for companies large and small—and nobody knowsthis better than a hacker. Traditionally, security for mobile deviceshas held a low priority. Now, a certified ethical hacker explains inthis book why this must change and how to change it. Packed with sobering examples of actual attacks, this unique resource shows you how to mount your counterattack.
From the Back CoverIs someone waiting to pick off your BlackBerry?
Today, it is almost impossible to do business without a cell phone anda BlackBerry or PDA. These devices are a lifeline for companies largeand small. And nobody knows this better than a hacker.Traditionally, security for mobile devices—which are essentiallyportable computers loaded with sensitive corporate and clientinformation—has had low priority. Now, a certified ethical hackerexplains why this must change and how to change it. Packed withsobering examples of actual attacks, this book shows you how to mountyour counterattack.
  • Understand each type of mobile device and the nature of the threat to each
  • Recognize and implement a strong security strategy
  • Identify specific threats to BlackBerry devices
  • Learn from analysis of actual exploits
  • Be able to anticipate future forms of attack
  • See how hackers create and modify their assaults
  • Defend against physical compromise and contamination from PC or LAN connectivity

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-9-20 15:35

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表