Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
2008-11-21 22:47
671 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Is someone waiting to pick off your BlackBerry?
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.
Traditionally, security for mobile deviceswhich are essentially portable computers loaded with sensitive corporate and client informationhas had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your counterattack.
*Understand each type of mobile device and the nature of the threat to each
*Recognize and implement a strong security strategy
*Identify specific threats to BlackBerry devices
*Learn from analysis of actual exploits
*Be able to anticipate future forms of attack
*See how hackers create and modify their assaults
*Defend against physical compromise and contamination from PC or LAN connectivity
http://rapidshare.com/files/48412071/0470127546.zip http://depositfiles.com/files/1476431
Is someone waiting to pick off your BlackBerry?
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.
Traditionally, security for mobile deviceswhich are essentially portable computers loaded with sensitive corporate and client informationhas had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your counterattack.
*Understand each type of mobile device and the nature of the threat to each
*Recognize and implement a strong security strategy
*Identify specific threats to BlackBerry devices
*Learn from analysis of actual exploits
*Be able to anticipate future forms of attack
*See how hackers create and modify their assaults
*Defend against physical compromise and contamination from PC or LAN connectivity
http://rapidshare.com/files/48412071/0470127546.zip http://depositfiles.com/files/1476431
相关文章推荐
- Creating Mobile Games: Using Java ME Platform to Put the Fun into Your Mobile Device and Cell Phone
- How to get and set the drawing order of layers in globe(获取并设置Globe图层的叠加次序:)
- How to enable USB selective suspend and system wake in the UMDF driver for a USB device
- The most simple and easy to use Qt GUI library plug-in FTStyle (2)The latest version - 2017.10
- The most simple and easy to use Qt GUI library plug-in FTStyle (3)How do Qt4 and Qt5 choose
- Do not request Window.FEATURE_ACTION_BAR and set windowActionBar to false in your theme to use a Toolbar instead
- How to copy and paste quickly in the shell
- Cannot resolve the collation conflict between "SQL_Latin1_General_CP1_CI_AS" and "Chinese_PRC_CI_AS" in the equal to operation.
- Issue 12(Anyone can make things bigger and more complex. What require more effort and courage is to move in the opposite directi
- How to access url via wifi in blackberry emulator
- 转载:how to automate Microsoft Excel and return the values from a multi-cell range to an array
- Ben-Eliezer was first elected to the Knesset in 1984 and has served in
- DataGridView in TabControl and CellValidating lead to problems
- The report is used to find enhancement and badi in sap.
- How To Query And Change The Oracle Hidden Parameters In Oracle 10g and 11g (文档 ID 315631.1)
- How To Turn Up Logging on the Siebel Web Server Extension in Siebel Versions 7.x and 8.x? [ID 477185
- How To Create a Child Domain in Active Directory and Delegate the DNS Namespace to the Child Domain
- Android: How to download the latest zip Android Source Code easily and using it in Intellij
- Instructing the GSM/GPRS Modem or Mobile Phone to Operate in SMS Text Mode
- #409 – 加入Grid中的子元素默认占满所在单元格(Child Elements in a Grid Size to Fit the Containing Cell)