舉報

會員
Mobile Security:How to Secure,Privatize,and Recover Your Devices
最新章節:
Index
Learnhowtokeepyourselfsafeonlinewitheasy-to-followexamplesandreal-lifescenarios.WrittenbydevelopersatIBM,thisguideshouldbetheonlyresourceyouneedtokeepyourpersonalinformationprivate.MobilesecurityisoneofthemosttalkedaboutareasinI.T.todaywithdatabeingstolenfromsmartphonesandtabletsaroundtheworld.Makesureyou,andyourfamily,areprotectedwhentheygoonline.
目錄(86章)
倒序
- 封面
- 版權信息
- Credits
- Foreword
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
- Chapter 1. Living in a Mobile World
- The dangers of mobile computers
- Precursors to the smartphone revolution – Internet social-networking and spam
- The new mobile world
- Mobile purchasing and identification methods – who needs credit cards?
- The cloud
- Summary
- Chapter 2. Users and Mobile Device Management
- Protecting the corporations
- Mobile and business
- Buying your device
- Mobile Device Management
- Acceptable use policy (AUP)
- Summary
- Chapter 3. Privacy – Small Word Big Consequences
- Troy and You
- Data good enough to steal
- Good idea mixed results
- And that's only the first part…
- Who has your data? Round 1…
- Who has your data? Round 2…
- Who has your data? Round 3…
- Who has your data? The final stretch…
- Your data in their hands
- Will your money be "too" mobile?
- Bring your mobile device to work day
- Steps you can take to protect yourself
- Summary
- Chapter 4. Mobile and Social – the Threats You Should Know About
- A prediction of the future (and the lottery numbers for next week) scams
- Social engineering
- Virus/worms/others
- Future threats
- Steps you can take to protect yourself
- Summing it up
- Summary
- Chapter 5. Protecting Your Mobile Devices
- Identifying your phone – the numbers that set your device apart
- Preventative measures – how to reduce the likelihood that your device will be hacked
- In the event that your device has been compromised
- Summing up
- Summary
- Chapter 6. Support and Warranty Insurance
- Toby's story
- The smartphone – a personal device a company device or both?
- The wide world of customer service and technical support
- OS operators manufacturers and service providers
- How to get the most out of your technical support experience if you have a malfunction
- Warranties in the mobile space
- Warranties
- In a nutshell
- Summary
- Chapter 7. Baby Boomers Teens and Tweens
- The boom in baby boomers
- Colliding generations
- Speaking of the younger generation…
- Summary
- Chapter 8. Getting Your Life Back After You've Been Hacked
- Device profiles
- Have you been hacked?
- In the event of a hack
- Summing it up
- Summary
- Appendix A. IBM Notes Traveler
- The architectural design of the IBM Notes Traveler service
- Overview of different clients
- Important review information
- Appendix B. Mobile Device Management
- Types of devices in the environment
- Mobile security policies in the environment
- Summary
- Appendix C. Tips to Help You Protect Your Mobile Device
- Appendix D. Mobile Acceptable Use Policy Template
- Mobile device acceptable use policy
- Glossary
- Appendix E. The History of Social Networking the Internet and Smartphones
- The Internet
- Index 更新時間:2021-08-06 16:59:44
推薦閱讀
- Node Security
- 零信任網絡:在不可信網絡中構建安全系統
- 深入淺出隱私計算:技術解析與應用實踐
- Enterprise Cloud Security and Governance
- 工業控制網絡安全技術
- Python Penetration Testing Cookbook
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- Digital Forensics with Kali Linux
- 華為防火墻實戰指南
- SQL Injection Strategies
- Mastering Malware Analysis
- INSTANT Kali Linux
- 網絡空間安全法律問題研究
- 黑客攻防與電腦安全從新手到高手(超值版)
- 紅藍攻防:技術與策略(原書第3版)
- 網絡安全與維護
- Web安全與攻防實戰從新手到高手(微課超值版)
- 無線安全與攻防入門很輕松(實戰超值版)
- 信息安全測評實戰指南
- Binary Analysis Cookbook
- 無線網絡安全攻防實戰進階
- 計算機網絡安全(第2版)
- 計算機網絡安全與防護
- 計算機網絡安全
- Building Virtual Pentesting Labs for Advanced Penetration Testing
- 計算機病毒學
- Web滲透測試新手實操詳解
- 密碼技術與物聯網安全:mbedtls開發實戰
- 網絡安全治理新格局
- 云計算安全技術