Home :: Books :: Professional & Technical  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical

Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
PDA Security : Incorporating Handhelds into the Enterprise

PDA Security : Incorporating Handhelds into the Enterprise

List Price: $39.95
Your Price: $34.05
Product Info Reviews

<< 1 >>

Rating: 5 stars
Summary: I am biased as the Author
Review: I look forward to comments and feedback. My authoring team is excited to bring this book to market as we feel it meets an underserved need to address PDAs specifically in the policy mangement and security area.

Rating: 4 stars
Summary: Good resources for the ins and outs of PDA security
Review: Most security managers wouldn't dream of leaving file servers or laptops filled with proprietary information unprotected. But the protection could be for naught if the same data is transferred to a personal digital assistant (PDA), which often is overlooked when security is considered. PDA Security: Incorporating Handhelds into the Enterprise trumpets the importance of PDA security and guides system administrators through protective measures.

When PDAs first appeared commercially, their capabilities were limited and their risks minimal. Today's PDAs have scores of megabytes of memory and well-developed networking capabilities, making them as important to protect as PCs and laptops.

PDA Security is valuable for corporate system administrators who need a PDA-protection architecture for their organizations. The book provides tactics on how to deploy, manage, and secure PDAs in the workplace.

Section one of the book offers a comprehensive introduction to PDA technology and security, with sections two and three exploring security mechanisms and strategies such as cryptography in greater detail. The book is not designed for end users; its information is far too technical for the casual PDA user. But administrators who must support and secure many PDAs will find a good resource here.

Rating: 4 stars
Summary: Great Resource For Securing PDA's and Mobile Devices
Review: This book provides a wealth of information for network and security administrators struggling to address the security risks posed by PDA's within their networks. It stands out as pretty much the only book addressing the security concerns of these convenient and valuable tools.

The book opens with a fairly comprehensive overview of PDA technology and the security features available. It then moves on to talk about other ways to secure the PDA such as encryption. Most importantly though, the book provides a wide range strategies and advice to help managers deploy and manage PDA's in their networks securely.

As the subtitle "Incorporating Handhelds Into The Enterprise" implies, the book is aimed at network and security administrators and not at the actual PDA users per se. The book serves as a great tool to help administrators begin to tackle the new security issues created by PDA's and to develop and implement structured policies to control PDA security in the enterprise.

PDA's are pretty much here to stay. I recommend that any network or security administrator with users using PDA's take a look at this book to get a grip on securing them.

Tony Bradley is a consultant and writer with a focus on network security, antivirus and incident response. He is the About.com Guide for Internet / Network Security (http://netsecurity.about.com), providing a broad range of information security tips, advice, reviews and information. Tony also contributes frequently to other industry publications. For a complete list of his freelance contributions you can visit Essential Computer Security (http://www.tonybradley.com)

Rating: 1 stars
Summary: Waste of time and money!
Review: This is a collection of information already on internet and by doing a few searches you can get it all. I would not pay for this.

I bought this book to learn more about the subject matter as we define policy for our company, however this looks like it's advertising about a product the author sells.

Waste of my time and money.

Rating: 4 stars
Summary: good book
Review: This is a good book about a forgotten subject: PDA Security.

People put loads on confidential information on their PDA's w/o thinking about security.

Hopefully, those types will read this book.

Rating: 4 stars
Summary: good book
Review: This is a good book about a forgotten subject: PDA Security.

People put loads on confidential information on their PDA's w/o thinking about security.

Hopefully, those types will read this book.

Rating: 4 stars
Summary: Five Stars for Timeliness!
Review: We're a small IT group in a growing manufacturing company. We know about NT, wired and lately wireless networks, databases, and client workstations. We knew little about ubiquitous, wireless, WPA based, handheld PDA's. And it seems the industry has not decided how to integrate security of these devices with the enterprise. This book serves as a starting point for someone that wants to evolve with the industry and extend the production enterprise.
This is a good book made great by it's early entry. Five stars, because it helps make sense of the "stew". Good luck to us all.


<< 1 >>

© 2004, ReviewFocus or its affiliates