Buy PDA Security Book by Mark Dinman - Bookswagon UAE
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > PDA Security: Incorporating Handhelds into the Enterprise
PDA Security: Incorporating Handhelds into the Enterprise

PDA Security: Incorporating Handhelds into the Enterprise


     0     
5
4
3
2
1



International Edition


X
About the Book

Because of their small, portable nature, PDAs present a unique security dilemma. This is the essential reference for PSA technicians and IT professionals who need to understand and solve this challenge. Written by a security expert, the book explores PDA security issues and details what must be done to establish privacy in the hand-held medium. It: covers the vast variety of devices available, including Palm, PocketPC, and RIM devices; includes foreword by Rebecca Bace, internationally recognized intrusion detection and network security specialist; includes a case study guide - "PDA Defense - Palm's Choice for Enterprise"; explains why handheld security is largely about OS (Operating Systems); explores hacking problems; answers the questions - when does a handheld become an IT problem and what is a measured IT response?

Table of Contents:
FOREWORD ACKNOWLEDGMENTS INTRODUCTION SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE Incorporating Handhelds into the Enterprise PDAs in the Enterprise The Power Resource Guide to Understanding Where Security Must be Achieved SECTION TWO: HANDHELDS IN THE ENTERPRISE When a Handheld Becomes Information Technology's Problem The Components of a Measured IT Response The How-To Guide SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE Understanding Handheld Security is Largely About the Operating System Hacking Threats and Mitigations SECTION FOUR: GRADUATION Handhelds Where Does Device Security Go from Here? INDEX

About the Author :
David Melnick currently holds the position of President of PDA Defense, the leading Enterprise PDA Security offering. Prior to PDA Defense, David helped to pioneer Internet-based financial transactional systems and security from the mid-'90s publishing multiple books on the execution of electronic commerce systems. As early as 1996, David was the focus of case studies in the area of Internet-based Electronic Commerce (Microsoft's Merchant Server Book -- Ventana, 1996). And, by 1997 David had taken the lead author role in the first book published on Microsoft's Active Server Pages (QUE/Macmillan Publishing, 1997). From the beginning of the 1990s David has worked to leverage technology and manage risk within the Financial Services industry starting with his work for one of the largest credit card processors. At GE's Credit Card companies, David worked with GE Corporate R&D to implement the first commercial application of Neural Network technology for risk management socring within the company, as well as later operationally working in both Fraud management and Risk Scoring Development groups. After GE, David's financial services work continued with the architecting of payment gateways currently in use by Bank of America and Wells Fargo Bank. In the credit card processing area, David worked closely with Visa and Bank of America to pilot early tests with Smart Cards and emerging security standards such as SET 0.0 for taking transactions over the Internet. Through a combination of published work, speaking engagements, and professional organization involvement. David has established a reputation fore leadership in the technology-intensive security and risk management areas, includingn a specialization in the area of financial services. Mark Dinman has over 17 years of experience in software systems development and IT project/program management. Mark joined Asynchrony Software when it launched in 2000 and served as the product manager of PDA Defense since its inception. Prior to joining Asynchrony, Mark spent 15 years with EDS in various roles serving a wide variety of clients and industries. His last assignment with EDS was as a Program Manager responsible for a global team developing and supporting a Material Management System for General Motors. Mark earned his master's degree in business administration from Washington University's John M. Olin School of Business and his BA magna cum laude from Brown University. He is also a certified Project Management Professional by the Project Management Institute (PMI) and currently serves as the President for the St. Louis PMI Chapter. Mark lives in Chesterfield, Missouri. Bob Elfanbaum is the Co-Founder and President of Asynchrony Solutions, Inc., a software technology firm with products and services focused on security, collaboration, and systems integration, including PDA Defense Enterprise, a leading security solution for handheld devices. Since its inception in 1998, Bob has led the company to significant relationships with Fortune 1000 and federal government clients including the U.S. Department of Defense, Boeing, and McKesson Information Solutions. Prior to founding Asynchrony, Bob was Chief Financial Officer of Virbac Corporation (NASDAQ: VBAC), a public animal health company, managing both the company's systems and financial organization. Bob is a CPA who also spent two years running the internal audit division of a Fortune 500 company, as well as eight years in the audit group of Price-WaterhouseCoopers. He earned his Bachelors degree, cum laude, with a major in accounting from Indiana University, Bloomington.

Review :
By Tony Bradley This book provides a wealth of information for network and security administrators struggling to address the security risks posed by PDA's within their networks. It stands out as pretty much the only book addressing the security concerns of these convenient and valuable tools. The book opens with a fairly comprehensive overview of PDA technology and the security features available. It then moves on to talk about other ways to secure the PDA such as encryption. Most importantly though, the book provides a wide range strategies and advice to help managers deploy and manage PDA's in their networks securely. As the subtitle "Incorporating Handhelds Into The Enterprise" implies, the book is aimed at network and security administrators and not at the actual PDA users per se. The book serves as a great tool to help administrators begin to tackle the new security issues created by PDA's and to develop and implement structured policies to control PDA security in the enterprise. PDA's are pretty much here to stay. I recommend that any network or security administrator with users using PDA's take a look at this book to get a grip on securing them. NetSecurityAbout.com 20040901 Most security managers wouldn't dream of leaving file servers or laptops filled with proprietary information unprotected. But the protection could be for naught if the same data is transferred to a personal digital assistant (PDA), which often is overlooked when security is considered. PDA Security: Incorporating Handhelds into the Enterprise trumpets the importance of PDA security and guides system administrators through protective measures. When PDAs first appeared commercially, their capabilities were limited and their risks minimal. Today's PDAs have scores of megabytes of memory and well-developed networking capabilities, making them as important to protect as PCs and laptops. PDA Security is valuable for corporate system administrators who need a PDA-protection architecture for their organizations. The book provides tactics on how to deploy, manage, and secure PDAs in the workplace. Section one of the book offers a comprehensive introduction to PDA technology and security, with sections two and three exploring security mechanisms and strategies such as cryptography in greater detail. The book is not designed for end users; its information is far too technical for the casual PDA user. But administrators who must support and secure many PDAs will find a good resource here. [Reviewer] Ben Rothke, CISSP (certified information systems security professional), is a New York City-based senior security consultant with ThruPoint, Inc. He is a member of ASIS International. Security Management 20040202


Best Sellers


Product Details
  • ISBN-13: 9780071424905
  • Publisher: McGraw-Hill Education - Europe
  • Publisher Imprint: McGraw-Hill Inc.,US
  • Height: 226 mm
  • No of Pages: 378
  • Spine Width: 26 mm
  • Weight: 539 gr
  • ISBN-10: 0071424903
  • Publisher Date: 25 Jul 2003
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Sub Title: Incorporating Handhelds into the Enterprise
  • Width: 152 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
PDA Security: Incorporating Handhelds into the Enterprise
McGraw-Hill Education - Europe -
PDA Security: Incorporating Handhelds into the Enterprise
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

PDA Security: Incorporating Handhelds into the Enterprise

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!