- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 87字
- 2021-06-24 16:38:58
Practical mobile forensic approaches
Similar to any forensic investigation, there are several approaches that can be used for the acquisition and examination/analysis of data from mobile phones. The type of mobile device, the operating system, and the security setting generally dictate the procedure to be followed in a forensic process. Every investigation is distinct with its own circumstances, so it is not possible to design a single definitive procedural approach for all cases. The following details outline the general approaches followed in extracting data from mobile devices.
推薦閱讀
- CTF實戰(zhàn):技術(shù)、解題與進階
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- 網(wǎng)絡(luò)安全保障能力研究
- INSTANT Burp Suite Starter
- 安全實戰(zhàn)之滲透測試
- 走進新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- INSTANT Windows PowerShell
- Learning Veeam? Backup & Replication for VMware vSphere
- Python Penetration Testing Cookbook
- Computer Forensics with FTK
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)(第2版)
- 從實踐中學(xué)習(xí)Kali Linux滲透測試
- 云原生安全與DevOps保障
- 云原生安全技術(shù)實踐指南
- 解密數(shù)據(jù)恢復(fù)