Chapter 4. Data Acquisition from iOS Devices
- Practical Mobile Forensics(Second Edition)
- Heather Mahalik Rohit Tamma Satish Bommisetty
- 266字
- 2021-07-16 10:55:57
上QQ閱讀APP看后續(xù)精彩內(nèi)容
登錄訂閱本章 >
推薦閱讀
- RESTful Java Web Services Security
- Metasploit Penetration Testing Cookbook(Third Edition)
- Learning Python for Forensics
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 可信計(jì)算3.0工程初步
- 開發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- 軟件開發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- API攻防:Web API安全指南
- Digital Forensics with Kali Linux
- Building a Home Security System with BeagleBone
- Kerberos域網(wǎng)絡(luò)安全從入門到精通
- 信息安全等級(jí)保護(hù)測(cè)評(píng)與整改指導(dǎo)手冊(cè)
- 安全防御入門手冊(cè)
- SQL Injection Strategies
- 黑客攻防從入門到精通