Marktplatzangebote
Ein Angebot für € 13,00 €
  • Broschiertes Buch

Is someone waiting to pick off your BlackBerry?
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.
Traditionally, security for mobile devices-which are essentially portable computers loaded with sensitive corporate and client information-has had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your…mehr

Produktbeschreibung
Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices-which are essentially portable computers loaded with sensitive corporate and client information-has had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your counterattack.

- Understand each type of mobile device and the nature of the threat to each

Recognize and implement a strong security strategy

Identify specific threats to BlackBerry devices

Learn from analysis of actual exploits

Be able to anticipate future forms of attack

See how hackers create and modify their assaults

Defend against physical compromise and contamination from PC or LAN connectivity.

Table of contents:
Introduction.

1. Understanding the Threats.

2. Understanding the Devices.

3. BlackBerry--Exploiting the Device.

4. Hacking the Supporting BlackBerry Infrastructure.

5. Protecting Your PC and LAN from BlackBerrys.

6. Understanding the Threats to PDAs.

7. Exploiting the Supporting PDA Infrastructure.

8. Protecting Your PC and LAN from PDAs.

9. Attacking Cell Phones.

10. Protecting the Enterprise PC and LAN from Cell Phones.
Autorenporträt
Daniel V. Hoffman, CISSP, CEH, CWNA has more than a decade of experience in remote-access security. He has built his expertise as an IT Director and U.S. Coast Guard Telecommunications Specialist, and is currently a Senior Engineer architecting security solutions for the largest companies in the world. He is known for his live hacking demonstrations, and his hacking videos have been featured in the Department of Homeland Security's open source infrastructure report.