- Practical Mobile Forensics(Second Edition)
- Heather Mahalik Rohit Tamma Satish Bommisetty
- 299字
- 2021-07-16 10:55:45
Preface
The exponential growth of mobile devices has revolutionized many aspects of our lives. In what is called as the post-PC era, smartphones are engulfing desktop computers with their enhanced functionality and improved storage capacity. This rapid transformation has led to increased usage of mobile handsets across all the sectors.
Despite their small size, smartphones are capable of performing many tasks: sending private messages and confidential e-mails, taking photos and videos, making online purchases, viewing our salary slips, completing banking transactions, accessing social networking sites, managing business tasks, and more. Hence, a mobile device is now a huge repository of sensitive data that can provide a wealth of information about its owner. This has in turn led to the evolution of Mobile Device Forensics, a branch of digital forensics that deals with retrieving data from a mobile device. Today, there is huge demand for specialized forensic experts, especially given the fact that the data retrieved from a mobile device is court admissible.
Mobile forensics is all about utilizing scientific methodologies to recover data stored within a mobile phone for legal purposes. Unlike traditional computer forensics, mobile forensics has limitations in obtaining evidence due to rapid changes in the technology and the fast-paced evolution of mobile software. With different operating systems and with a wide range of models being released into the market, mobile forensics has expanded over the last few years. Specialized forensic techniques and skills are required in order to extract data under different conditions.
This book takes you through the challenges involved in mobile forensics and practically explains detailed methods of collecting evidence from different mobile devices with iOS, Android, and Windows mobile operating systems.
This book is organized in a manner that allows you to focus independently on chapters that are specific to your required platform.
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 工業(yè)互聯(lián)網(wǎng)安全
- 工業(yè)物聯(lián)網(wǎng)安全
- 安全技術(shù)運(yùn)營:方法與實(shí)踐
- 防火墻技術(shù)與應(yīng)用(第2版)
- Applied Network Security
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)(第2版)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- 實(shí)用黑客攻防技術(shù)
- Kali Linux高級滲透測試(原書第4版)
- Hands-On Artificial Intelligence for Cybersecurity
- 黑客攻防從入門到精通:命令版
- 一本書讀透金融科技安全