舉報

會員
Mobile Security:How to Secure,Privatize,and Recover Your Devices
最新章節:
Index
Learnhowtokeepyourselfsafeonlinewitheasy-to-followexamplesandreal-lifescenarios.WrittenbydevelopersatIBM,thisguideshouldbetheonlyresourceyouneedtokeepyourpersonalinformationprivate.MobilesecurityisoneofthemosttalkedaboutareasinI.T.todaywithdatabeingstolenfromsmartphonesandtabletsaroundtheworld.Makesureyou,andyourfamily,areprotectedwhentheygoonline.
目錄(86章)
倒序
- 封面
- 版權信息
- Credits
- Foreword
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
- Chapter 1. Living in a Mobile World
- The dangers of mobile computers
- Precursors to the smartphone revolution – Internet social-networking and spam
- The new mobile world
- Mobile purchasing and identification methods – who needs credit cards?
- The cloud
- Summary
- Chapter 2. Users and Mobile Device Management
- Protecting the corporations
- Mobile and business
- Buying your device
- Mobile Device Management
- Acceptable use policy (AUP)
- Summary
- Chapter 3. Privacy – Small Word Big Consequences
- Troy and You
- Data good enough to steal
- Good idea mixed results
- And that's only the first part…
- Who has your data? Round 1…
- Who has your data? Round 2…
- Who has your data? Round 3…
- Who has your data? The final stretch…
- Your data in their hands
- Will your money be "too" mobile?
- Bring your mobile device to work day
- Steps you can take to protect yourself
- Summary
- Chapter 4. Mobile and Social – the Threats You Should Know About
- A prediction of the future (and the lottery numbers for next week) scams
- Social engineering
- Virus/worms/others
- Future threats
- Steps you can take to protect yourself
- Summing it up
- Summary
- Chapter 5. Protecting Your Mobile Devices
- Identifying your phone – the numbers that set your device apart
- Preventative measures – how to reduce the likelihood that your device will be hacked
- In the event that your device has been compromised
- Summing up
- Summary
- Chapter 6. Support and Warranty Insurance
- Toby's story
- The smartphone – a personal device a company device or both?
- The wide world of customer service and technical support
- OS operators manufacturers and service providers
- How to get the most out of your technical support experience if you have a malfunction
- Warranties in the mobile space
- Warranties
- In a nutshell
- Summary
- Chapter 7. Baby Boomers Teens and Tweens
- The boom in baby boomers
- Colliding generations
- Speaking of the younger generation…
- Summary
- Chapter 8. Getting Your Life Back After You've Been Hacked
- Device profiles
- Have you been hacked?
- In the event of a hack
- Summing it up
- Summary
- Appendix A. IBM Notes Traveler
- The architectural design of the IBM Notes Traveler service
- Overview of different clients
- Important review information
- Appendix B. Mobile Device Management
- Types of devices in the environment
- Mobile security policies in the environment
- Summary
- Appendix C. Tips to Help You Protect Your Mobile Device
- Appendix D. Mobile Acceptable Use Policy Template
- Mobile device acceptable use policy
- Glossary
- Appendix E. The History of Social Networking the Internet and Smartphones
- The Internet
- Index 更新時間:2021-08-06 16:59:44
推薦閱讀
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Enterprise Cloud Security and Governance
- 同態密碼學原理及算法
- ARM匯編與逆向工程:藍狐卷·基礎知識
- 計算機網絡安全技術研究
- 從0到1:CTFer成長之路
- 物聯網安全滲透測試技術
- 網絡安全與攻防入門很輕松(實戰超值版)
- 云計算安全防護技術
- Web代碼安全漏洞深度剖析
- Practical Mobile Forensics
- 一本書讀透金融科技安全
- 密碼朋克:自由與互聯網的未來
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- ATT&CK視角下的紅藍對抗實戰指南
- 大數據時代的云安全
- 工業控制系統網絡安全實戰
- 網絡安全與維護
- 攜手構建網絡空間命運共同體
- Web應用漏洞掃描產品原理與應用
- 信息安全風險管理與實踐
- 黑客攻防從入門到精通(加密與解密篇)
- Mastering Mobile Forensics
- 信息安全技術專業基于工作過程支撐平臺課程體系開發實踐
- iOS黑客攻防秘籍(第2版)
- 構建可信白環境:方法與實踐
- 權限提升技術:攻防實戰與技巧
- Burp Suite Cookbook
- 信息系統等級保護安全建設技術方案設計實現與應用
- 動手學差分隱私