Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Blackjacking [electronic resource] : security threats to Blackberry devices, PDAs, and cell phones in the enterprise / Daniel Hoffman.

By: Hoffman, Daniel (Daniel V.), 1972-.
Material type: TextTextPublisher: Indianapolis, IN : Wiley Pub., c2007Description: 1 online resource (xx, 292 p.) : ill.ISBN: 9780470169766 (electronic bk.); 0470169761 (electronic bk.).Subject(s): Wireless communication systems -- Security measures | BlackBerry (Smartphone) -- Security measures | Pocket computers -- Security measures | Cell phones -- Security measures | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Wireless communication systems / Security measures | BlackBerry (Computer) / Security measures | Pocket computers / Security measures | Cellular telephones / Security measures | Wireless communication systems / Security measures | BlackBerry (Computer) / Security measures | Pocket computers / Security measures | Cellular telephones / Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: Blackjacking.DDC classification: 005.8 Online resources: EBSCOhost
Contents:
Ch. 1. Understanding the threats -- Ch. 2. Understanding the devices -- Ch. 3. Exploiting BlackBerry devices -- Ch. 4. Hacking the supporting BlackBerry infrastructure -- Ch. 5. Protecting your PC and LAN from BlackBerrys -- Ch. 6. Exploiting PDAs -- Ch. 7. Hacking the supporting PDA infrastructure -- Ch. 8. Protecting your PC and LAN from PDAs -- Ch. 9. Exploiting cell phones -- Ch. 10. Protecting the enterprise PC and LAN from cell phones.
Summary: Is someone waiting to pick off your BlackBerry?. Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and index.

Ch. 1. Understanding the threats -- Ch. 2. Understanding the devices -- Ch. 3. Exploiting BlackBerry devices -- Ch. 4. Hacking the supporting BlackBerry infrastructure -- Ch. 5. Protecting your PC and LAN from BlackBerrys -- Ch. 6. Exploiting PDAs -- Ch. 7. Hacking the supporting PDA infrastructure -- Ch. 8. Protecting your PC and LAN from PDAs -- Ch. 9. Exploiting cell phones -- Ch. 10. Protecting the enterprise PC and LAN from cell phones.

Description based on print version record.

Is someone waiting to pick off your BlackBerry?. Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Blackjacking by Hoffman, Daniel ©2007
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter