did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470127544

Blackjacking: Security Threats to BlackBerry® Devices, PDAs, and Cell Phones in the Enterprise

by
  • ISBN13:

    9780470127544

  • ISBN10:

    0470127546

  • Format: Paperback
  • Copyright: 2007-04-01
  • Publisher: Wiley
  • Purchase Benefits
List Price: $39.99
We're Sorry.
No Options Available at This Time.

Summary

Is someone waiting to pick off your BlackBerry? Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker. Traditionally, security for mobile devices-which are essentially portable computers loaded with sensitive corporate and client information-has had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your counterattack. Understand each type of mobile device and the nature of the threat to each Recognize and implement a strong security strategy Identify specific threats to BlackBerry devices Learn from analysis of actual exploits Be able to anticipate future forms of attack See how hackers create and modify their assaults Defend against physical compromise and contamination from PC or LAN connectivity

Author Biography

Daniel V. Hoffman, CISSP, CEH, CWNA has more than a decade of experience in remote-access security. He has built his expertise as an IT Director and U.S. Coast Guard Telecommunications Specialist, and is currently a Senior Engineer architecting security solutions for the largest companies in the world. He is known for his live hacking demonstrations, and his hacking videos have been featured in the Department of Homeland Security's open source infrastructure report.

Table of Contents

Understanding the threats
Understanding the devices
Exploiting BlackBerry devices
Hacking the supporting BlackBerry infrastructure
Protecting your PC and LAN from BlackBerrys
Exploiting PDAs
Hacking the supporting PDA infrastructure
Protecting your PC and LAN from PDAs
Exploiting cell phones
Protecting the enterprise PC and LAN from cell phones
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program