| 000 | 00911camuu22002534a 4500 | |
| 001 | 000045151642 | |
| 005 | 20050215154205 | |
| 008 | 050215s2003 nyua 001 0 eng | |
| 020 | ▼a 0071424903 | |
| 040 | ▼a DLC ▼c DLC ▼d DLC ▼d DLC ▼d 244002 | |
| 042 | ▼a pcc | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b M445 2003 |
| 082 | 0 0 | ▼a 005.8 ▼2 21 |
| 090 | ▼a 005.8 ▼b M527p | |
| 100 | 1 | ▼a Melnick, David. |
| 245 | 1 0 | ▼a PDA security : ▼b incorporating handhelds into the enterprise / ▼c David Melnick. |
| 260 | ▼a New York : ▼b McGraw-Hill, ▼c 2003. | |
| 300 | ▼a xxi, 378 p. : ▼b ill. ; ▼c 23 cm. | |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Portable computers ▼x Programming. |
| 650 | 0 | ▼a Mobile computing. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 M527p | 등록번호 151173147 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Because of their small, portable nature, PDAs present a unique security dilemma. This is the essential reference for PSA technicians and IT professionals who need to understand and solve this challenge. Written by a security expert, the book explores PDA security issues and details what must be done to establish privacy in the hand-held medium. It: covers the vast variety of devices available, including Palm, PocketPC, and RIM devices; includes foreword by Rebecca Bace, internationally recognized intrusion detection and network security specialist; includes a case study guide - "PDA Defense - Palm's Choice for Enterprise"; explains why handheld security is largely about OS (Operating Systems); explores hacking problems; answers the questions - when does a handheld become an IT problem and what is a measured IT response?
정보제공 :
목차
FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE
Incorporating Handhelds into the Enterprise
PDAs in the Enterprise
The Power Resource Guide to Understanding Where Security Must be Achieved
SECTION TWO: HANDHELDS IN THE ENTERPRISE
When a Handheld Becomes Information Technology's Problem
The Components of a Measured IT Response
The How-To Guide
SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE
Understanding Handheld Security is Largely About the Operating System
Hacking Threats and Mitigations
SECTION FOUR: GRADUATION
Handhelds
Where Does Device Security Go from Here?
INDEX
정보제공 :
