更新时间:2021-08-06 16:59:44
封面
版权信息
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Chapter 1. Living in a Mobile World
The dangers of mobile computers
Precursors to the smartphone revolution – Internet social-networking and spam
The new mobile world
Mobile purchasing and identification methods – who needs credit cards?
The cloud
Summary
Chapter 2. Users and Mobile Device Management
Protecting the corporations
Mobile and business
Buying your device
Mobile Device Management
Acceptable use policy (AUP)
Chapter 3. Privacy – Small Word Big Consequences
Troy and You
Data good enough to steal
Good idea mixed results
And that's only the first part…
Who has your data? Round 1…
Who has your data? Round 2…
Who has your data? Round 3…
Who has your data? The final stretch…
Your data in their hands
Will your money be "too" mobile?
Bring your mobile device to work day
Steps you can take to protect yourself
Chapter 4. Mobile and Social – the Threats You Should Know About
A prediction of the future (and the lottery numbers for next week) scams
Social engineering
Virus/worms/others
Future threats
Summing it up
Chapter 5. Protecting Your Mobile Devices
Identifying your phone – the numbers that set your device apart
Preventative measures – how to reduce the likelihood that your device will be hacked
In the event that your device has been compromised
Summing up
Chapter 6. Support and Warranty Insurance
Toby's story
The smartphone – a personal device a company device or both?
The wide world of customer service and technical support
OS operators manufacturers and service providers
How to get the most out of your technical support experience if you have a malfunction
Warranties in the mobile space
Warranties
In a nutshell
Chapter 7. Baby Boomers Teens and Tweens
The boom in baby boomers
Colliding generations
Speaking of the younger generation…
Chapter 8. Getting Your Life Back After You've Been Hacked
Device profiles
Have you been hacked?
In the event of a hack
Appendix A. IBM Notes Traveler
The architectural design of the IBM Notes Traveler service
Overview of different clients
Important review information
Appendix B. Mobile Device Management
Types of devices in the environment
Mobile security policies in the environment
Appendix C. Tips to Help You Protect Your Mobile Device
Appendix D. Mobile Acceptable Use Policy Template
Mobile device acceptable use policy
Glossary
Appendix E. The History of Social Networking the Internet and Smartphones
The Internet
Index