Protection of your wireless transactions
47
Encryption makes your data unreadable by anyone but the intended recipient.
Encryption is done using a technology used in a wide variety of consumer
handheld devices and enterprise applications.
It’s not unusual to experience a delay of several seconds when a wireless
transaction is being encrypted.
In addition to the protection provided by the encryption technology, individual
web clipping applications may add another layer of protection to their
transactions. For example, a web clipping application may require you to create
and use a password to access sensitive information (for example, your checking
account).
Summary of Contents for i700 Series
Page 10: ...Contents viii ...
Page 12: ...About This Book 2 ...
Page 42: ...Chapter 3 Entering Data in Your Handheld 32 ...
Page 58: ...Chapter 4 Using Wireless Features 48 ...
Page 117: ...Calculator menus 107 Options menus About Calculator Shows version information for Calculator ...
Page 118: ...Chapter 8 Using Calculator 108 ...
Page 124: ...Chapter 10 Using Clock 114 ...
Page 142: ...Chapter 12 Using Memo Pad 132 ...
Page 154: ...Chapter 14 Using Security 144 ...
Page 160: ...Chapter 15 Using To Do List 150 ...
Page 206: ...Chapter 17 Setting Preferences for Your Handheld 196 ...
Page 212: ...Appendix A Maintaining Your Handheld 202 ...
Page 226: ...Appendix B Frequently Asked Questions 216 ...
Page 238: ...Index 228 ...