首頁 > 計(jì)算機(jī)網(wǎng)絡(luò) >
計(jì)算機(jī)安全
> Mobile Security:How to Secure,Privatize,and Recover Your Devices最新章節(jié)目錄
舉報(bào)

會(huì)員
Mobile Security:How to Secure,Privatize,and Recover Your Devices
最新章節(jié):
Index
Learnhowtokeepyourselfsafeonlinewitheasy-to-followexamplesandreal-lifescenarios.WrittenbydevelopersatIBM,thisguideshouldbetheonlyresourceyouneedtokeepyourpersonalinformationprivate.MobilesecurityisoneofthemosttalkedaboutareasinI.T.todaywithdatabeingstolenfromsmartphonesandtabletsaroundtheworld.Makesureyou,andyourfamily,areprotectedwhentheygoonline.
目錄(86章)
倒序
- 封面
- 版權(quán)信息
- Credits
- Foreword
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
- Chapter 1. Living in a Mobile World
- The dangers of mobile computers
- Precursors to the smartphone revolution – Internet social-networking and spam
- The new mobile world
- Mobile purchasing and identification methods – who needs credit cards?
- The cloud
- Summary
- Chapter 2. Users and Mobile Device Management
- Protecting the corporations
- Mobile and business
- Buying your device
- Mobile Device Management
- Acceptable use policy (AUP)
- Summary
- Chapter 3. Privacy – Small Word Big Consequences
- Troy and You
- Data good enough to steal
- Good idea mixed results
- And that's only the first part…
- Who has your data? Round 1…
- Who has your data? Round 2…
- Who has your data? Round 3…
- Who has your data? The final stretch…
- Your data in their hands
- Will your money be "too" mobile?
- Bring your mobile device to work day
- Steps you can take to protect yourself
- Summary
- Chapter 4. Mobile and Social – the Threats You Should Know About
- A prediction of the future (and the lottery numbers for next week) scams
- Social engineering
- Virus/worms/others
- Future threats
- Steps you can take to protect yourself
- Summing it up
- Summary
- Chapter 5. Protecting Your Mobile Devices
- Identifying your phone – the numbers that set your device apart
- Preventative measures – how to reduce the likelihood that your device will be hacked
- In the event that your device has been compromised
- Summing up
- Summary
- Chapter 6. Support and Warranty Insurance
- Toby's story
- The smartphone – a personal device a company device or both?
- The wide world of customer service and technical support
- OS operators manufacturers and service providers
- How to get the most out of your technical support experience if you have a malfunction
- Warranties in the mobile space
- Warranties
- In a nutshell
- Summary
- Chapter 7. Baby Boomers Teens and Tweens
- The boom in baby boomers
- Colliding generations
- Speaking of the younger generation…
- Summary
- Chapter 8. Getting Your Life Back After You've Been Hacked
- Device profiles
- Have you been hacked?
- In the event of a hack
- Summing it up
- Summary
- Appendix A. IBM Notes Traveler
- The architectural design of the IBM Notes Traveler service
- Overview of different clients
- Important review information
- Appendix B. Mobile Device Management
- Types of devices in the environment
- Mobile security policies in the environment
- Summary
- Appendix C. Tips to Help You Protect Your Mobile Device
- Appendix D. Mobile Acceptable Use Policy Template
- Mobile device acceptable use policy
- Glossary
- Appendix E. The History of Social Networking the Internet and Smartphones
- The Internet
- Index 更新時(shí)間:2021-08-06 16:59:44
推薦閱讀
- RESTful Java Web Services Security
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 網(wǎng)絡(luò)安全保障能力研究
- 黑客攻防入門秘笈
- 數(shù)據(jù)安全實(shí)踐指南
- Python Penetration Testing Cookbook
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 人工智能安全(精裝版)
- 電腦安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 信息技術(shù)基礎(chǔ):提高篇·實(shí)驗(yàn)與習(xí)題
- 捍衛(wèi)隱私
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- 信息內(nèi)容安全管理及應(yīng)用
- Securing Network Infrastructure
- Practical Internet of Things Security
- Metasploit 5.0 for Beginners
- 網(wǎng)站入侵與腳本技術(shù)快速防殺
- 云原生安全
- 隱私計(jì)算與密碼學(xué)應(yīng)用實(shí)踐
- HTTPS權(quán)威指南:在服務(wù)器和Web應(yīng)用上部署SSL/TLS和PKI
- 信息安全測評實(shí)戰(zhàn)指南
- 2018—2019年中國網(wǎng)絡(luò)安全發(fā)展藍(lán)皮書
- 網(wǎng)絡(luò)安全之機(jī)器學(xué)習(xí)
- 網(wǎng)絡(luò)靶場與攻防演練
- FreeRTOS內(nèi)核實(shí)現(xiàn)與應(yīng)用開發(fā)實(shí)戰(zhàn)指南:基于STM32
- 網(wǎng)絡(luò)空間安全與關(guān)鍵信息基礎(chǔ)設(shè)施安全
- 大數(shù)據(jù)安全治理與防范:流量反欺詐實(shí)戰(zhàn)
- 博弈論與數(shù)據(jù)保護(hù)