Mobile Security:How to Secure,Privatize,and Recover Your Devices
Tim Speed Darla Nykamp Mari Heiser Joseph Anderson Jaya Nampalli更新时间:2021-08-06 16:59:44
最新章节:Index封面
版权信息
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Chapter 1. Living in a Mobile World
The dangers of mobile computers
Precursors to the smartphone revolution – Internet social-networking and spam
The new mobile world
Mobile purchasing and identification methods – who needs credit cards?
The cloud
Summary
Chapter 2. Users and Mobile Device Management
Protecting the corporations
Mobile and business
Buying your device
Mobile Device Management
Acceptable use policy (AUP)
Summary
Chapter 3. Privacy – Small Word Big Consequences
Troy and You
Data good enough to steal
Good idea mixed results
And that's only the first part…
Who has your data? Round 1…
Who has your data? Round 2…
Who has your data? Round 3…
Who has your data? The final stretch…
Your data in their hands
Will your money be "too" mobile?
Bring your mobile device to work day
Steps you can take to protect yourself
Summary
Chapter 4. Mobile and Social – the Threats You Should Know About
A prediction of the future (and the lottery numbers for next week) scams
Social engineering
Virus/worms/others
Future threats
Steps you can take to protect yourself
Summing it up
Summary
Chapter 5. Protecting Your Mobile Devices
Identifying your phone – the numbers that set your device apart
Preventative measures – how to reduce the likelihood that your device will be hacked
In the event that your device has been compromised
Summing up
Summary
Chapter 6. Support and Warranty Insurance
Toby's story
The smartphone – a personal device a company device or both?
The wide world of customer service and technical support
OS operators manufacturers and service providers
How to get the most out of your technical support experience if you have a malfunction
Warranties in the mobile space
Warranties
In a nutshell
Summary
Chapter 7. Baby Boomers Teens and Tweens
The boom in baby boomers
Colliding generations
Speaking of the younger generation…
Summary
Chapter 8. Getting Your Life Back After You've Been Hacked
Device profiles
Have you been hacked?
In the event of a hack
Summing it up
Summary
Appendix A. IBM Notes Traveler
The architectural design of the IBM Notes Traveler service
Overview of different clients
Important review information
Appendix B. Mobile Device Management
Types of devices in the environment
Mobile security policies in the environment
Summary
Appendix C. Tips to Help You Protect Your Mobile Device
Appendix D. Mobile Acceptable Use Policy Template
Mobile device acceptable use policy
Glossary
Appendix E. The History of Social Networking the Internet and Smartphones
The Internet
Index
更新时间:2021-08-06 16:59:44