LOCK IN PDA SECURITY: * Let an IT security expert help you assess the PDA threat to your business * Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks * Maximize and protect the value of increasingly capable personal digital assistants to your organization DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS. PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you're an information…mehr
LOCK IN PDA SECURITY: * Let an IT security expert help you assess the PDA threat to your business * Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks * Maximize and protect the value of increasingly capable personal digital assistants to your organization DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS. PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you're an information technology or business executive, the time is right to size up the unique security risks these small, portable devices pose. This essential primer for those deploying, managing or using PDAs in the workplace will help you understand and address the challenges presented by this emerging set of technologies. Written by respected IT security experts, PDA Security, shows you how to: * Assess the level of threat posed by PDAs in your organization * Develop a measured and enforceable policy response to minimize the risk * Understand the technical issues and defend against the threats PDAs pose to privacy, theft of sensitive information, system corruption, and other issues of network and data misuse * Analyze secure solutions for all major handhelds -- Palm, PocketPC, and RIM * Examine a case study on securing Palm for the work environment * Learn why solutions almost always involve the operating system * Discover what White-Hat Hacking reveals about vulnerabilities * Find profitable ways to integrate PDAs into business plans and networks, while downsizing risks * Get an insider's preview of the future of handhelds -- the PCs of the early twenty-first century With a Foreword by Rebecca Bace, internationally renowned intrusion-detection and network-security specialist and former member of the United States Department of Defense National Security Agency (NSA). For ongoing news and original content on PDA security, related Web sites, and a calendar of related events, visit www.pdasecurity-book.comHinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
David Melnick currently holds the position of President of PDA Defense, the leading Enterprise PDA Security offering. Prior to PDA Defense, David helped to pioneer Internet-based financial transactional systems and security from the mid-'90s publishing multiple books on the execution of electronic commerce systems. As early as 1996, David was the focus of case studies in the area of Internet-based Electronic Commerce (Microsoft's Merchant Server Book -- Ventana, 1996). And, by 1997 David had taken the lead author role in the first book published on Microsoft's Active Server Pages (QUE/Macmillan Publishing, 1997). From the beginning of the 1990s David has worked to leverage technology and manage risk within the Financial Services industry starting with his work for one of the largest credit card processors. At GE's Credit Card companies, David worked with GE Corporate R&D to implement the first commercial application of Neural Network technology for risk management socring within the company, as well as later operationally working in both Fraud management and Risk Scoring Development groups. After GE, David's financial services work continued with the architecting of payment gateways currently in use by Bank of America and Wells Fargo Bank. In the credit card processing area, David worked closely with Visa and Bank of America to pilot early tests with Smart Cards and emerging security standards such as SET 0.0 for taking transactions over the Internet. Through a combination of published work, speaking engagements, and professional organization involvement. David has established a reputation fore leadership in the technology-intensive security and risk management areas, includingn a specialization in the area of financial services. Mark Dinman has over 17 years of experience in software systems development and IT project/program management. Mark joined Asynchrony Software when it launched in 2000 and served as the product manager of PDA Defense since its inception. Prior to joining Asynchrony, Mark spent 15 years with EDS in various roles serving a wide variety of clients and industries. His last assignment with EDS was as a Program Manager responsible for a global team developing and supporting a Material Management System for General Motors. Mark earned his master's degree in business administration from Washington University's John M. Olin School of Business and his BA magna cum laude from Brown University. He is also a certified Project Management Professional by the Project Management Institute (PMI) and currently serves as the President for the St. Louis PMI Chapter. Mark lives in Chesterfield, Missouri. Bob Elfanbaum is the Co-Founder and President of Asynchrony Solutions, Inc., a software technology firm with products and services focused on security, collaboration, and systems integration, including PDA Defense Enterprise, a leading security solution for handheld devices. Since its inception in 1998, Bob has led the company to significant relationships with Fortune 1000 and federal government clients including the U.S. Department of Defense, Boeing, and McKesson Information Solutions. Prior to founding Asynchrony, Bob was Chief Financial Officer of Virbac Corporation (NASDAQ: VBAC), a public animal health company, managing both the company's systems and financial organization. Bob is a CPA who also spent two years running the internal audit division of a Fortune 500 company, as well as eight years in the audit group of Price-WaterhouseCoopers. He earned his Bachelors degree, cum laude, with a major in accounting from Indiana University, Bloomington.
Inhaltsangabe
FOREWORD ACKNOWLEDGMENTS INTRODUCTION SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE Incorporating Handhelds into the Enterprise PDAs in the Enterprise The Power Resource Guide to Understanding Where Security Must be Achieved SECTION TWO: HANDHELDS IN THE ENTERPRISE When a Handheld Becomes Information Technology's Problem The Components of a Measured IT Response The How-To Guide SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE Understanding Handheld Security is Largely About the Operating System Hacking Threats and Mitigations SECTION FOUR: GRADUATION Handhelds Where Does Device Security Go from Here? INDEX
FOREWORD ACKNOWLEDGMENTS INTRODUCTION SECTION ONE: INTRODUCTION TO PDA SECURITY IN THE ENTERPRISE Incorporating Handhelds into the Enterprise PDAs in the Enterprise The Power Resource Guide to Understanding Where Security Must be Achieved SECTION TWO: HANDHELDS IN THE ENTERPRISE When a Handheld Becomes Information Technology's Problem The Components of a Measured IT Response The How-To Guide SECTION THREE: THE TECHNOLOGY OF PDA SECURITY: CRYPTOGRAPHY, PASSWORDS, HACKING, AND MORE Understanding Handheld Security is Largely About the Operating System Hacking Threats and Mitigations SECTION FOUR: GRADUATION Handhelds Where Does Device Security Go from Here? INDEX
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497