Blackjacking and over one million other books are available for Amazon Kindle. Learn more
Buy New
  • List Price: $39.99
  • Save: $11.08 (28%)
FREE Shipping on orders over $35.
Only 1 left in stock.
Ships from and sold by
Gift-wrap available.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise Paperback – April 30, 2007

ISBN-13: 978-0470127544 ISBN-10: 0470127546 Edition: 1st

Buy New
Price: $28.91
27 New from $1.89 45 Used from $0.01 1 Collectible from $9.98
Amazon Price New from Used from
"Please retry"
"Please retry"
$1.89 $0.01


Shop the new
New! Introducing the, a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 312 pages
  • Publisher: Wiley; 1 edition (April 30, 2007)
  • Language: English
  • ISBN-10: 0470127546
  • ISBN-13: 978-0470127544
  • Product Dimensions: 9.2 x 7.4 x 0.7 inches
  • Shipping Weight: 1 pounds (View shipping rates and policies)
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #2,340,484 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially portable computers loaded with sensitive corporate and client information—has had low priority. Now, a certified ethical hacker explains why this must change and how to change it. Packed with sobering examples of actual attacks, this book shows you how to mount your counterattack.

  • Understand each type of mobile device and the nature of the threat to each
  • Recognize and implement a strong security strategy

  • Identify specific threats to BlackBerry devices

  • Learn from analysis of actual exploits

  • Be able to anticipate future forms of attack

  • See how hackers create and modify their assaults

  • Defend against physical compromise and contamination from PC or LAN connectivity

About the Author

Daniel V. Hoffman, CISSP, CEH, CWNA has more than a decade of experience in remote-access security. He has built his expertise as an IT Director and U.S. Coast Guard Telecommunications Specialist, and is currently a Senior Engineer architecting security solutions for the largest companies in the world. He is known for his live hacking demonstrations, and his hacking videos have been featured in the Department of Homeland Security's open source infrastructure report.

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.3 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See all 3 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

4 of 4 people found the following review helpful By Chris Gates on July 17, 2007
Format: Paperback
Blackjacking takes on the task of educating both administrators and management about the threats of mobile devices to their enterprise. I believe this book succeeds in its task and serves as a great reference not only for the blackberry enterprise server (BES) administrators out there but also for the network administrators, help desk personnel, security personnel as well as a book that can aid in the education of the end users. It is written in a tone and dialog that can be useful to the technical reader and non-technical reader and does well digging into the relatively new field of mobile device (especially BlackBerry) security.

The book starts out with a very good overview of the threats to mobile devices (Malware, Direct Attack, Data Communication Interception, Spoofing and Sniffing, and Physical Compromise). It then moves into an excellent overview of the devices that will be covered in the book (BlackBerrys, Pocket PCs, Palm Handhelds, and Cell Phones).
From there each device is covered in depth with "Exploiting the Device", "Hacking the Supporting Device Infrastructure", and "Protecting your PC and LAN from the Device."

The BlackBerry section (which is probably why you are thinking about purchasing the book) does a great job covering the current and future attacks given the fairly limited publicly available research, tools, and code and gives solid advice on setting up your network infrastructure to deal with the growing threat with mobile devices. The vignettes discussing plausible attacks for each attack scenario serve as good feasible examples to think about for your enterprise and users and how to protect your network.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Chris Kuhl on January 24, 2008
Format: Paperback
This book is a very interesting, quick and easy read. It not only talks about the issues of deploying a blackberry environment inside your organization, but also addresses smartphones, and other pda's.
The only issue I really have with this book, is the author presents ideas on how to "more" securly deploy a BES server in ways that either aren't supported by Blackberry (place your entire BES server in the DMZ) or "according to Blackberry" don't by you any type of security "Deploy the BES router function only in the DMZ).
I would use this book as a great starting point, but also do your research before you start declaring the sky is falling for your organization.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By T. Stirman on June 4, 2008
Format: Paperback
Personally, I skipped over the entire BlackBerry section (I'll read it later) and went straight to the the PDA section. My reasoning for this is that I do not, currently, support any BlackBerry users. I do support a lot of Palm users and have a Windows Mobile PDA, myself. There is a surprising amount of detail to be had on a subject that is not getting the light it needs, but I feel there could be a little more. Perhaps I am greedy in that respect, though. Excellent book. I hope to see more like it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images