PDA Security: Incorporating Handhelds Into the Enterprise

Paperback | July 25, 2003

byDavid Melnick

not yet rated|write a review
LOCK IN PDA SECURITY:
* Let an IT security expert help you assess the PDA threat to your business
* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks
* Maximize and protect the value of increasingly capable personal digital assistants to your organization

DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS.

PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you're an information technology or business executive, the time is right to size up the unique security risks these small, portable devices pose. This essential primer for those deploying, managing or using PDAs in the workplace will help you understand and address the challenges presented by this emerging set of technologies. Written by respected IT security experts, PDA Security, shows you how to:
* Assess the level of threat posed by PDAs in your organization
* Develop a measured and enforceable policy response to minimize the risk
* Understand the technical issues and defend against the threats PDAs pose to privacy, theft of sensitive information, system corruption, and other issues of network and data misuse
* Analyze secure solutions for all major handhelds -- Palm, PocketPC, and RIM
* Examine a case study on securing Palm for the work environment
* Learn why solutions almost always involve the operating system
* Discover what White-Hat Hacking reveals about vulnerabilities
* Find profitable ways to integrate PDAs into business plans and networks, while downsizing risks
* Get an insider's preview of the future of handhelds -- the PCs of the early twenty-first century

With a Foreword by Rebecca Bace, internationally renowned intrusion-detection and network-security specialist and forme

Pricing and Purchase Info

$55.41 online
$63.95 list price (save 13%)
In stock online
Ships free on orders over $25

From the Publisher

LOCK IN PDA SECURITY: * Let an IT security expert help you assess the PDA threat to your business * Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks * Maximize and protect the value of increa...

From the Jacket

LOCK IN PDA SECURITY:* Let an IT security expert help you assess the PDA threat to your business* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks* Maximize and protect the value of increasin...

David Melnick currently holds the position of President of PDA Defense, the leading Enterprise PDA Security offering. Prior to PDA Defense, David helped to pioneer Internet-based financial transactional systems and security from the mid-'90s publishing multiple books on the execution of electronic commerce systems. As early as 1996, ...
Format:PaperbackPublished:July 25, 2003Publisher:McGraw-Hill Professional PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0071424903

ISBN - 13:9780071424905

Look for similar items by category:

Customer Reviews of PDA Security: Incorporating Handhelds Into the Enterprise

Reviews

Extra Content

Table of Contents

FOREWORD

ACKNOWLEDGMENTS

INTRODUCTION

SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE

Incorporating Handhelds into the Enterprise

PDAs in the Enterprise

The Power Resource Guide to Understanding Where Security Must be Achieved

SECTION TWO: HANDHELDS IN THE ENTERPRISE

When a Handheld Becomes Information Technology's Problem

The Components of a Measured IT Response

The How-To Guide

SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE

Understanding Handheld Security is Largely About the Operating System

Hacking Threats and Mitigations

SECTION FOUR: GRADUATION

Handhelds

Where Does Device Security Go from Here?

INDEX

Editorial Reviews

Most security managers wouldn't dream of leaving file servers or laptops filled with proprietary information unprotected. But the protection could be for naught if the same data is transferred to a personal digital assistant (PDA), which often is overlooked when security is considered. PDA Security: Incorporating Handhelds into the Enterprise trumpets the importance of PDA security and guides system administrators through protective measures. When PDAs first appeared commercially, their capabilities were limited and their risks minimal. Today's PDAs have scores of megabytes of memory and well-developed networking capabilities, making them as important to protect as PCs and laptops. PDA Security is valuable for corporate system administrators who need a PDA-protection architecture for their organizations. The book provides tactics on how to deploy, manage, and secure PDAs in the workplace. Section one of the book offers a comprehensive introduction to PDA technology and security, with sections two and three exploring security mechanisms and strategies such as cryptography in greater detail. The book is not designed for end users; its information is far too technical for the casual PDA user. But administrators who must support and secure many PDAs will find a good resource here. [Reviewer] Ben Rothke, CISSP (certified information systems security professional), is a New York City-based senior security consultant with ThruPoint, Inc. He is a member of ASIS International.