Printer Friendly

PDA Security: Incorporating Handhelds Into the Enterprise.

PDA Security: Incorporating Handhelds Into the Enterprise. By David Melnick, Mark Dinman, and Alexander Muratov; published by McGraw-Hill, 877/833-5524 (phone), books.mcgraw-hill.com (Web); 378 pages; $39.95.

Most security managers wouldn't dream of leaving file servers or laptops filled with proprietary information unprotected. But the protection could be for naught if the same data is transferred to a personal digital assistant (PDA), which often is overlooked when security is considered. PDA Security: Incorporating Handhelds into the Enterprise trumpets the importance of PDA security and guides system administrators through protective measures.

When PDAs first appeared commercially, their capabilities were limited and their risks minimal. Today's PDAs have scores of megabytes of memory and well-developed networking capabilities, making them as important to protect as PCs and laptops.

PDA Security is valuable for corporate system administrators who need a PDA-protection architecture for their organizations. The book provides tactics on how to deploy, manage, and secure PDAs in the workplace.

Section one of the book offers a comprehensive introduction to PDA technology and security, with sections two and three exploring security mechanisms and strategies such as cryptography in greater detail. The book is not designed for end users; its information is far too technical for the casual PDA user. But administrators who must support and secure many PDAs will find a good resource here.

Ben Rothke, CISSP (certified information systems security professional), is a New York City-based senior security consultant with ThruPoint, Inc. He is a member of A SIS International.
COPYRIGHT 2004 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2004 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Rothke, Ben
Publication:Security Management
Article Type:Book Review
Geographic Code:1USA
Date:Feb 1, 2004
Words:249
Previous Article:Threat Assessment: A Risk Management Approach.
Next Article:Toxic Warfare.
Topics:


Related Articles
NEC COMPUTERS INC. UNVEILS PLANS FOR POCKET PC CORPORATE PERSONAL DIGITAL ASSISTANT.
Are PDAs worth the cost? (Trends).
By the numbers: a data bank on education trends for district leaders: this month: PDAS.
Mobile security.
Docs: PDA use at point of care can cut medical mistakes.
PDA security: vulnerabilities & solution: is your company one lost device away from disaster?
Secure devices.
Using PDAs in libraries; a how-to-do-it manual.
Get smart: wouldn't it be great if your cell phone, laptop, and PDA could be molded into one mobile device? They can: it's called a smartphone, and...

Terms of use | Privacy policy | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters