- Mobile Forensics Cookbook
- Igor Mikhaylov
- 249字
- 2021-07-02 21:47:56
About the Author
Igor Mikhaylov has been working as a forensics expert for 21 years. During this time, he had attended a lot of seminars and training classes in top forensic companies (such as Guidance Software, AccessData, and Cellebrite) and forensic departments of government organizations in the Russian Federation. He has experience and skills in computer forensics, incident response, cellphones forensics, chip-off forensics, malware forensics, data recovery, digital images analysis, video forensics, big data, and other fields. He has worked on several thousand forensic cases. When he works on a forensic case, he examines evidence using in-depth, industry-leading tools and techniques. He uses forensic software and hardware from leaders in the forensics industry. He has written three tutorials on cellphone forensics and incident response for Russian-speaking forensics experts.
He is the reviewer of Windows Forensics Cookbook by Oleg Skulkin and Scar de Courcier, Packt Publishing.
I would like to thank various people for their contribution to this book—All people from the Packt team for their valuable technical support; Vladimir Katalov (ElcomSoft Co.Ltd.), Oleg Fedorov (Oxygen Forensics, Inc.), Yury Gubanov (Belkasoft?), and Anton Evgraschenkov (Lan Project, a partner of Cellebrite) who shared their software for this book.
I'd like to thank my family—my wife Olga and our two sons, Max and Ilya. I really appreciate their patience and understanding.
I'd also like to thank Oleg Skulkin, Andrew Rubtsov, and Evgeniy Chapurin for their useful and constructive recommendations on this book; thank you, gentlemen.
- 數(shù)字身份與元宇宙信任治理
- 腦洞大開:滲透測試另類實(shí)戰(zhàn)攻略
- Practical Network Scanning
- Enterprise Cloud Security and Governance
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 數(shù)據(jù)安全實(shí)踐指南
- Testing and Securing Android Studio Applications
- CTF競賽權(quán)威指南(Pwn篇)
- 華為防火墻實(shí)戰(zhàn)指南
- 先進(jìn)云安全研究與實(shí)踐
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 交換機(jī)·路由器·防火墻(第2版)
- ATT&CK與威脅獵殺實(shí)戰(zhàn)
- 密碼朋克:自由與互聯(lián)網(wǎng)的未來