Ch. 1. Understanding the threats -- Ch. 2. Understanding the devices -- Ch. 3. Exploiting BlackBerry devices -- Ch. 4. Hacking the supporting BlackBerry infrastructure -- Ch. 5. Protecting your PC and LAN from BlackBerrys -- Ch. 6. Exploiting PDAs -- Ch. 7. Hacking the supporting PDA infrastructure -- Ch. 8. Protecting your PC and LAN from PDAs -- Ch. 9. Exploiting cell phones -- Ch. 10. Protecting the enterprise PC and LAN from cell phones
Summary
Is someone waiting to pick off your BlackBerry?. Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker