Jump to ratings and reviews
Rate this book

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Rate this book
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens. Overview In Detail The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don’t manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security is growing on a daily basis and this guide may just be the help you need. Mobile How to secure, privatize and recover your devices will teach you how to recognize, protect against, and recover from hacking attempts and outline the clear and present threats to your online identity posed by the use of a mobile device. In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work. What you will learn from this book Approach Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Who this book is written for Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

242 pages, Paperback

First published January 1, 2013

2 people are currently reading
8 people want to read

About the author

Tim Speed

18 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
3 (42%)
4 stars
2 (28%)
3 stars
2 (28%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 - 2 of 2 reviews
1 review
December 6, 2013
E-book: http://goo.gl/wFdw9J

/*-ENGLISH-*/

This is a book related to mobile technology. In a globalized world of today, which are used in the 1.4 billion smartphones in the world and the data they contain are sensitive, you should pay close attention to the issue of security and risk involved in using them.
It is noteworthy that all the authors work or are related to the IBM company. It's a quick read book contains about 220 pages. It contains 8 chapters and five appendices:
Chapter 1: Living in a Mobile World
Chapter 2: Users and Mobile Device Management
Chapter 3: Privacy – Small Word, Big Consequences
Chapter 4: Mobile and Social – the Threats You Should
Chapter 5: Protecting Your Mobile Devices
Chapter 6: Support and Warranty Insurance
Chapter 7: Baby Boomers, Teens, and Tweens
Chapter 8: Getting Your Life Back After You've Been Hacked.
If we examine the points played on each chapter we see that it is not a book made for personal Security IT a company solely, on the contrary, it is a reading that I would recommend to any person who holds a Smartphone and even for person who has never had one and are thinking about buying one (as it shows that there are risks to take and work with a Smartphone).
No talk of a platform specific but important points touching the 2 prevailing in the world of Smartphone platforms: iOS and Android. None of these platforms is free of vulnerabilities and attacks, but the book illustrates what the suffering lesser extent. It also shows the risks of taking possession of the equipment, ie, remove the constraints set by the manufacturer to the OS (Jailbreak or Rooting). In addition to showing clear and illustrated the most common attacks suffered by Smartphone also as we read the chapters come out recommendations and tools that should be used to ensure our device examples.

Finally Appendices important touch points for IT managers, talk about IBM solutions for managing mobile devices and items related to the business issue.

/*-ESPAÑOL-*/

Este es un libro relacionado con la tecnología móvil. En un mundo globalizado como el de hoy en día, en el que se usan 1.4 billion smartphones en el mundo y los datos que contienen son sensibles, hay que prestar mucha atención al tema de la seguridad y riesgo que conlleva usarlos.
Llama la atención que todos los autores trabajan o están relacionados con la compañía IBM. Es un libro de lectura rápida consta de unas 220 páginas. Contiene 8 Capítulos y 5 apéndices:
Chapter 1: Living in a Mobile World
Chapter 2: Users and Mobile Device Management
Chapter 3: Privacy – Small Word, Big Consequences
Chapter 4: Mobile and Social – the Threats You Should
Chapter 5: Protecting Your Mobile Devices
Chapter 6: Support and Warranty Insurance
Chapter 7: Baby Boomers, Teens, and Tweens
Chapter 8: Getting Your Life Back After You've Been Hacked

Si examinamos los puntos que se tocan en cada capítulo podemos apreciar que no es un libro hecho únicamente para el personal de seguridad IT de una compañía; por el contrario es una lectura que yo le recomendaría a toda persona que posea un Smartphone e incluso para la persona que nunca ha tenido alguno y está pensando en adquirir uno (ya que nos muestra los riesgos que existen al tener y trabajar con un Smartphone).

No habla de una plataforma en especifica sino que toca puntos importantes de las 2 plataformas reinantes en el mundo de los Smartphone: iOS y Android. Ninguna de estas plataformas esta exenta de vulnerabilidades y ataques, pero el libro nos ilustra cual es la que sufre en menor medida. También nos muestra los riesgos que conlleva tomar posesión del equipo, es decir, eliminar las restricciones que pone el fabricante al OS (Jailbreak o Rooting). Además de mostrarnos ejemplos claros e ilustrados de los ataques más comunes que sufren los Smartphone también a medida que vamos leyendo los capítulos van saliendo recomendaciones y herramientas que deberíamos de usar para asegurar nuestro dispositivo.

Para terminar los apéndices tocan puntos importantes para los administradores de IT, hablan sobre soluciones de IBM para administrar los dispositivos móviles y puntos relacionados con el tema empresarial.
Profile Image for Bill Jones.
72 reviews2 followers
November 15, 2013
This book is an absolute must for anyone who is looking into the future uses of our common day to day devices. I have asked myself many times if I wanted to root my tablet or jailbreaked my phone and this book has opened my eyes to the darker reality that lurks around every corner. Visiting Starbucks while using their wifi? If your device is rooted or jailbreaked and you lack common knowledge you have opened up the possibility that I can then interact with your device on a whole new level, and I can steal your data.

I couldn't put this book down I had to keep reading because as things got clearer the more scarier they also got, it was like reading a mystery book except without the mystery because the author clearly identifies everything you need to know, even covers topics with your mobile carrier or corporate network and how altering your device can open up your company to attack! I really appreciated how everything was laid out and it seemed to flow really well into the next chapter.

Get this book and it won't be disappointing, you will learn so much about your device security and at the same time it will blow your mind!

http://www.packtpub.com/mobile-securi...
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.