Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker. Traditionally, security for mobile devices - which are essentially portable computers loaded with sensitive corporate and client information - has had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your counterattack.
To get the best shopping experience from our website we recommend that you sign in to your shopper
account. By signing in to your account we can tailor the site to your preferences and allow you to
add items directly to your wish list from the book details pages.
Be the first to know about sales, contests, new arrivals, limited time discounts & more!
Terms & Conditions