目錄(58章)
倒序
- coverpage
- Mastering Mobile Forensics
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Mobile Forensics and the Investigation Process Model
- Why mobile forensics?
- Smartphone forensics models
- Smartphone forensics challenges
- Summary
- Chapter 2. Do It Yourself – Low-Level Techniques
- Getting acquainted with file carving
- Extracting metadata – GPS analysis
- String dump and analysis
- Encryption versus encoding versus hashing
- Decompiling and disassembling
- Summary
- Chapter 3. iDevices from a Forensic Point of View
- The iOS architecture
- The iOS filesystem
- iOS platform and hardware security
- Identifying stored data
- iOS acquisition and forensic approaches
- It's going biometric!
- Third-party applications
- Summary
- Chapter 4. Android Forensics
- Android OS – all you need to know
- Android security model
- Bypassing security
- Android logical data acquisition
- Android physical data acquisition
- JTAG and chip-off forensic examinations
- Third-party applications and a real case study
- Summary
- Chapter 5. Windows Phone 8 Forensics
- Windows Phone 7 versus Windows Phone 8
- Windows Phone 8 internals
- Windows phone 8 security models
- Windows Phone logical acquisition
- JTAG and physical acquisition
- Artifact location and user PIN study
- Summary
- Chapter 6. Mobile Forensics – Best Practices
- Presenting a mobile forensics process
- Mobile device identification
- Summary
- Appendix A. Preparing a Mobile Forensic Workstation
- Index 更新時間:2021-07-16 10:37:30
推薦閱讀
- 云原生安全:攻防實踐與體系構(gòu)建
- Kali Linux CTF Blueprints
- 零信任網(wǎng)絡:在不可信網(wǎng)絡中構(gòu)建安全系統(tǒng)
- 計算機病毒分析與防范大全(第3版)
- 網(wǎng)絡空間安全實驗
- Building a Home Security System with BeagleBone
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- API安全技術與實戰(zhàn)
- 學電腦安全與病毒防范
- Instant Java Password and Authentication Security
- 先進云安全研究與實踐
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 信息安全工程與實踐
- Web安全攻防從入門到精通
- Kali Linux無線網(wǎng)絡滲透測試詳解
- Manga Studio 5 Beginner's Guide
- Web前端黑客技術揭秘
- 復雜網(wǎng)絡環(huán)境下訪問控制技術
- 零信任安全從入門到精通
- INSTANT Penetration Testing:Setting Up a Test Lab How-to
- Web安全與攻防實戰(zhàn)從新手到高手(微課超值版)
- 從實踐中學習Fiddler Web應用分析
- Hands-On Web Penetration Testing with Metasploit
- 黑客攻防從入門到精通(加密與解密篇)
- 華為防火墻技術漫談
- 構(gòu)建可信白環(huán)境:方法與實踐
- Practical Mobile Forensics(Second Edition)
- 網(wǎng)絡空間安全與關鍵信息基礎設施安全
- Becoming the Hacker
- 物聯(lián)網(wǎng)安全