HOME > 상세정보

상세정보

PDA security : incorporating handhelds into the enterprise

PDA security : incorporating handhelds into the enterprise (1회 대출)

자료유형
단행본
개인저자
Melnick, David.
서명 / 저자사항
PDA security : incorporating handhelds into the enterprise / David Melnick.
발행사항
New York :   McGraw-Hill,   2003.  
형태사항
xxi, 378 p. : ill. ; 23 cm.
ISBN
0071424903
일반주제명
Computer security. Portable computers -- Programming. Mobile computing.
000 00911camuu22002534a 4500
001 000045151642
005 20050215154205
008 050215s2003 nyua 001 0 eng
020 ▼a 0071424903
040 ▼a DLC ▼c DLC ▼d DLC ▼d DLC ▼d 244002
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b M445 2003
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b M527p
100 1 ▼a Melnick, David.
245 1 0 ▼a PDA security : ▼b incorporating handhelds into the enterprise / ▼c David Melnick.
260 ▼a New York : ▼b McGraw-Hill, ▼c 2003.
300 ▼a xxi, 378 p. : ▼b ill. ; ▼c 23 cm.
650 0 ▼a Computer security.
650 0 ▼a Portable computers ▼x Programming.
650 0 ▼a Mobile computing.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 M527p 등록번호 151173147 (1회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

Because of their small, portable nature, PDAs present a unique security dilemma. This is the essential reference for PSA technicians and IT professionals who need to understand and solve this challenge. Written by a security expert, the book explores PDA security issues and details what must be done to establish privacy in the hand-held medium. It: covers the vast variety of devices available, including Palm, PocketPC, and RIM devices; includes foreword by Rebecca Bace, internationally recognized intrusion detection and network security specialist; includes a case study guide - "PDA Defense - Palm's Choice for Enterprise"; explains why handheld security is largely about OS (Operating Systems); explores hacking problems; answers the questions - when does a handheld become an IT problem and what is a measured IT response?


정보제공 : Aladin

목차

FOREWORD

ACKNOWLEDGMENTS

INTRODUCTION

SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE

Incorporating Handhelds into the Enterprise

PDAs in the Enterprise

The Power Resource Guide to Understanding Where Security Must be Achieved

SECTION TWO: HANDHELDS IN THE ENTERPRISE

When a Handheld Becomes Information Technology's Problem

The Components of a Measured IT Response

The How-To Guide

SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE

Understanding Handheld Security is Largely About the Operating System

Hacking Threats and Mitigations

SECTION FOUR: GRADUATION

Handhelds

Where Does Device Security Go from Here?

INDEX


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)