目錄(58章)
倒序
- coverpage
- Mastering Mobile Forensics
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Mobile Forensics and the Investigation Process Model
- Why mobile forensics?
- Smartphone forensics models
- Smartphone forensics challenges
- Summary
- Chapter 2. Do It Yourself – Low-Level Techniques
- Getting acquainted with file carving
- Extracting metadata – GPS analysis
- String dump and analysis
- Encryption versus encoding versus hashing
- Decompiling and disassembling
- Summary
- Chapter 3. iDevices from a Forensic Point of View
- The iOS architecture
- The iOS filesystem
- iOS platform and hardware security
- Identifying stored data
- iOS acquisition and forensic approaches
- It's going biometric!
- Third-party applications
- Summary
- Chapter 4. Android Forensics
- Android OS – all you need to know
- Android security model
- Bypassing security
- Android logical data acquisition
- Android physical data acquisition
- JTAG and chip-off forensic examinations
- Third-party applications and a real case study
- Summary
- Chapter 5. Windows Phone 8 Forensics
- Windows Phone 7 versus Windows Phone 8
- Windows Phone 8 internals
- Windows phone 8 security models
- Windows Phone logical acquisition
- JTAG and physical acquisition
- Artifact location and user PIN study
- Summary
- Chapter 6. Mobile Forensics – Best Practices
- Presenting a mobile forensics process
- Mobile device identification
- Summary
- Appendix A. Preparing a Mobile Forensic Workstation
- Index 更新時間:2021-07-16 10:37:30
推薦閱讀
- Extending Symfony2 Web Application Framework
- Web漏洞分析與防范實戰:卷1
- Penetration Testing with Perl
- 防火墻技術與應用(第2版)
- 局域網交換機安全
- INSTANT Apple Configurator How-to
- Learning Pentesting for Android Devices
- Mastering Linux Security and Hardening
- 捍衛隱私
- 復雜信息系統網絡安全體系建設指南
- 企業數據安全防護指南
- 2010年中國互聯網網絡安全報告
- 黑客攻防從入門到精通:絕招版(第2版)
- 互聯網域名國際化與安全技術導論
- 2023—2024年中國網絡安全發展藍皮書
- ATT&CK框架實踐指南(第2版)
- 網絡安全應急響應基礎理論及關鍵技術
- Web應用安全威脅與防治
- 網絡空間安全原理與實踐
- INSTANT Citrix Security How-to
- 網絡關鍵設備安全通用要求解讀
- 大模型安全、監管與合規
- 黑客攻防從入門到精通(Web技術實戰篇)
- App安全實戰指南:Android和iOS App的安全攻防與合規
- 可信計算標準導論
- Microsoft 365 Security Administration:MS-500 Exam Guide
- 物聯網安全與隱私保護
- 網絡安全治理新格局
- 云計算安全
- AWD特訓營:技術解析、賽題實戰與競賽技巧