|
本帖最后由 石头 于 2009-12-20 22:19 编辑
作者:Daniel V. Hoffman
出版日期:April 30, 2007
出版社:其它
页数:312
ISBN:978-0470127544
文件格式:PDF
Product DescriptionToday, it is almost impossibleto do business without a cell phone and a BlackBerry or PDA. Thesedevices are the lifeline for companies large and small—and nobody knowsthis better than a hacker. Traditionally, security for mobile deviceshas held a low priority. Now, a certified ethical hacker explains inthis book why this must change and how to change it. Packed with sobering examples of actual attacks, this unique resource shows you how to mount your counterattack.
From the Back CoverIs someone waiting to pick off your BlackBerry?
Today, it is almost impossible to do business without a cell phone anda BlackBerry or PDA. These devices are a lifeline for companies largeand small. And nobody knows this better than a hacker.Traditionally, security for mobile devices—which are essentiallyportable computers loaded with sensitive corporate and clientinformation—has had low priority. Now, a certified ethical hackerexplains why this must change and how to change it. Packed withsobering examples of actual attacks, this book shows you how to mountyour counterattack.
- Understand each type of mobile device and the nature of the threat to each
- Recognize and implement a strong security strategy
- Identify specific threats to BlackBerry devices
- Learn from analysis of actual exploits
- Be able to anticipate future forms of attack
- See how hackers create and modify their assaults
- Defend against physical compromise and contamination from PC or LAN connectivity
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有账号?注册
×
|