search for books and compare prices
Tables of Contents for Pda Security
Chapter/Section Title
Page #
Page Count

FOREWORD

ACKNOWLEDGMENTS

INTRODUCTION

SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE

Incorporating Handhelds into the Enterprise

PDAs in the Enterprise

The Power Resource Guide to Understanding Where Security Must be Achieved

SECTION TWO: HANDHELDS IN THE ENTERPRISE

When a Handheld Becomes Information Technology's Problem

The Components of a Measured IT Response

The How-To Guide

SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE

Understanding Handheld Security is Largely About the Operating System

Hacking Threats and Mitigations

SECTION FOUR: GRADUATION

Handhelds

Where Does Device Security Go from Here?

INDEX