舉報

會員
Mobile Security:How to Secure,Privatize,and Recover Your Devices
最新章節:
Index
Learnhowtokeepyourselfsafeonlinewitheasy-to-followexamplesandreal-lifescenarios.WrittenbydevelopersatIBM,thisguideshouldbetheonlyresourceyouneedtokeepyourpersonalinformationprivate.MobilesecurityisoneofthemosttalkedaboutareasinI.T.todaywithdatabeingstolenfromsmartphonesandtabletsaroundtheworld.Makesureyou,andyourfamily,areprotectedwhentheygoonline.
目錄(86章)
倒序
- 封面
- 版權信息
- Credits
- Foreword
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
- Chapter 1. Living in a Mobile World
- The dangers of mobile computers
- Precursors to the smartphone revolution – Internet social-networking and spam
- The new mobile world
- Mobile purchasing and identification methods – who needs credit cards?
- The cloud
- Summary
- Chapter 2. Users and Mobile Device Management
- Protecting the corporations
- Mobile and business
- Buying your device
- Mobile Device Management
- Acceptable use policy (AUP)
- Summary
- Chapter 3. Privacy – Small Word Big Consequences
- Troy and You
- Data good enough to steal
- Good idea mixed results
- And that's only the first part…
- Who has your data? Round 1…
- Who has your data? Round 2…
- Who has your data? Round 3…
- Who has your data? The final stretch…
- Your data in their hands
- Will your money be "too" mobile?
- Bring your mobile device to work day
- Steps you can take to protect yourself
- Summary
- Chapter 4. Mobile and Social – the Threats You Should Know About
- A prediction of the future (and the lottery numbers for next week) scams
- Social engineering
- Virus/worms/others
- Future threats
- Steps you can take to protect yourself
- Summing it up
- Summary
- Chapter 5. Protecting Your Mobile Devices
- Identifying your phone – the numbers that set your device apart
- Preventative measures – how to reduce the likelihood that your device will be hacked
- In the event that your device has been compromised
- Summing up
- Summary
- Chapter 6. Support and Warranty Insurance
- Toby's story
- The smartphone – a personal device a company device or both?
- The wide world of customer service and technical support
- OS operators manufacturers and service providers
- How to get the most out of your technical support experience if you have a malfunction
- Warranties in the mobile space
- Warranties
- In a nutshell
- Summary
- Chapter 7. Baby Boomers Teens and Tweens
- The boom in baby boomers
- Colliding generations
- Speaking of the younger generation…
- Summary
- Chapter 8. Getting Your Life Back After You've Been Hacked
- Device profiles
- Have you been hacked?
- In the event of a hack
- Summing it up
- Summary
- Appendix A. IBM Notes Traveler
- The architectural design of the IBM Notes Traveler service
- Overview of different clients
- Important review information
- Appendix B. Mobile Device Management
- Types of devices in the environment
- Mobile security policies in the environment
- Summary
- Appendix C. Tips to Help You Protect Your Mobile Device
- Appendix D. Mobile Acceptable Use Policy Template
- Mobile device acceptable use policy
- Glossary
- Appendix E. The History of Social Networking the Internet and Smartphones
- The Internet
- Index 更新時間:2021-08-06 16:59:44
推薦閱讀
- DevSecOps敏捷安全
- Web漏洞分析與防范實戰:卷1
- 網絡空間攻防技術原理
- Metasploit Penetration Testing Cookbook(Third Edition)
- CSO進階之路:從安全工程師到首席安全官
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 信息系統安全檢測與風險評估
- Penetration Testing with Perl
- 同態密碼學原理及算法
- 網絡空間安全實驗
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 云原生安全技術實踐指南
- 信息安全導論(第2版)
- 數據保護:工作負載的可恢復性
- 博弈論與數據安全
- Bug Bounty Hunting Essentials
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- Web安全攻防從入門到精通
- Web前端黑客技術揭秘
- 大中型網絡入侵要案直擊與防御
- 網絡空間安全技術
- 網絡空間安全原理與實踐
- Mastering Identity and Access Management with Microsoft Azure
- 2018—2019年中國網絡安全發展藍皮書
- 黑客攻防從入門到精通:命令版(第2版)
- Practical Mobile Forensics(Second Edition)
- 信息安全案例教程:技術與應用
- 天地一體化信息網絡信息安全保障技術
- VMware vSphere Security Cookbook
- Mastering Azure Security