search for books and compare prices
Tables of Contents for Pda Security
FOREWORDACKNOWLEDGMENTSINTRODUCTIONSECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISEIncorporating Handhelds into the EnterprisePDAs in the EnterpriseThe Power Resource Guide to Understanding Where Security Must be AchievedSECTION TWO: HANDHELDS IN THE ENTERPRISEWhen a Handheld Becomes Information Technology's ProblemThe Components of a Measured IT ResponseThe How-To GuideSECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MOREUnderstanding Handheld Security is Largely About the Operating SystemHacking Threats and MitigationsSECTION FOUR: GRADUATIONHandheldsWhere Does Device Security Go from Here?INDEX