本文共 1138 字,大约阅读时间需要 3 分钟。
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp Is someone waiting to pick off your BlackBerry?Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.
Traditionally, security for mobile deviceswhich are essentially portable computers loaded with sensitive corporate and client informationhas had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your counterattack.
*Understand each type of mobile device and the nature of the threat to each *Recognize and implement a strong security strategy *Identify specific threats to BlackBerry devices *Learn from analysis of actual exploits *Be able to anticipate future forms of attack *See how hackers create and modify their assaults *Defend against physical compromise and contamination from PC or LAN connectivity http://rapidshare.com/files/48412071/0470127546.zip http://depositfiles.com/files/1476431