PDA Security : Incorporating Handhelds into the Enterprise

個数:

PDA Security : Incorporating Handhelds into the Enterprise

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 378 p.
  • 言語 ENG
  • 商品コード 9780071424905
  • DDC分類 005.8

Full Description

Because of their small, portable nature, PDAs present a unique security dilemma. This is the essential reference for PSA technicians and IT professionals who need to understand and solve this challenge. Written by a security expert, the book explores PDA security issues and details what must be done to establish privacy in the hand-held medium. It: covers the vast variety of devices available, including Palm, PocketPC, and RIM devices; includes foreword by Rebecca Bace, internationally recognized intrusion detection and network security specialist; includes a case study guide - "PDA Defense - Palm's Choice for Enterprise"; explains why handheld security is largely about OS (Operating Systems); explores hacking problems; answers the questions - when does a handheld become an IT problem and what is a measured IT response?

Contents

FOREWORD ACKNOWLEDGMENTS INTRODUCTION SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE Incorporating Handhelds into the Enterprise PDAs in the Enterprise The Power Resource Guide to Understanding Where Security Must be Achieved SECTION TWO: HANDHELDS IN THE ENTERPRISE When a Handheld Becomes Information Technology's Problem The Components of a Measured IT Response The How-To Guide SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE Understanding Handheld Security is Largely About the Operating System Hacking Threats and Mitigations SECTION FOUR: GRADUATION Handhelds Where Does Device Security Go from Here? INDEX