- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 157字
- 2021-06-24 16:38:59
Understanding mobile operating systems
One of the major factors in the data acquisition and examination/analysis of a mobile phone is the operating system. From low-end mobile phones to smartphones, mobile operating systems have come a long way with a lot of features. Mobile operating systems directly affect how you can access the mobile device. For example, Android gives terminal-level access whereas iOS does not give such an option.
A comprehensive understanding of the mobile platform helps the forensic examiner make sound forensic decisions and conduct a conclusive investigation. While there is a large range of smart mobile devices, with the demise of Blackberry, currently two main operating systems dominate the market, namely Google Android and Apple iOS (followed by Windows Phone at a distant third). More information can be found at https://www.idc.com/promo/smartphone-market-share/os. This book covers the forensic analysis of these three mobile platforms. We will provide a brief overview of the leading mobile operating systems.
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- Mastering Kali Linux for Advanced Penetration Testing
- Kali Linux Wireless Penetration Testing Cookbook
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- 華為防火墻實(shí)戰(zhàn)指南
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- 云計(jì)算安全防護(hù)技術(shù)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- 數(shù)字銀行安全體系構(gòu)建
- 從實(shí)踐中學(xué)習(xí)Nmap滲透測(cè)試
- 互聯(lián)網(wǎng)域名國(guó)際化與安全技術(shù)導(dǎo)論
- Web前端黑客技術(shù)揭秘
- 深入探索區(qū)塊鏈
- Python Penetration Testing Essentials
- 隱私計(jì)算與密碼學(xué)應(yīng)用實(shí)踐