目錄(58章)
倒序
- coverpage
- Mastering Mobile Forensics
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Mobile Forensics and the Investigation Process Model
- Why mobile forensics?
- Smartphone forensics models
- Smartphone forensics challenges
- Summary
- Chapter 2. Do It Yourself – Low-Level Techniques
- Getting acquainted with file carving
- Extracting metadata – GPS analysis
- String dump and analysis
- Encryption versus encoding versus hashing
- Decompiling and disassembling
- Summary
- Chapter 3. iDevices from a Forensic Point of View
- The iOS architecture
- The iOS filesystem
- iOS platform and hardware security
- Identifying stored data
- iOS acquisition and forensic approaches
- It's going biometric!
- Third-party applications
- Summary
- Chapter 4. Android Forensics
- Android OS – all you need to know
- Android security model
- Bypassing security
- Android logical data acquisition
- Android physical data acquisition
- JTAG and chip-off forensic examinations
- Third-party applications and a real case study
- Summary
- Chapter 5. Windows Phone 8 Forensics
- Windows Phone 7 versus Windows Phone 8
- Windows Phone 8 internals
- Windows phone 8 security models
- Windows Phone logical acquisition
- JTAG and physical acquisition
- Artifact location and user PIN study
- Summary
- Chapter 6. Mobile Forensics – Best Practices
- Presenting a mobile forensics process
- Mobile device identification
- Summary
- Appendix A. Preparing a Mobile Forensic Workstation
- Index 更新時間:2021-07-16 10:37:30
推薦閱讀
- Android應用安全實戰:Frida協議分析
- 科技安全:戰略實踐與展望
- 黑客大曝光:無線網絡安全(原書第3版)
- CSO進階之路:從安全工程師到首席安全官
- INSTANT Metasploit Starter
- 數字安全藍皮書:本質屬性與重要特征
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 數據安全實踐指南
- 同態密碼學原理及算法
- 云原生安全與DevOps保障
- 數據保護:工作負載的可恢復性
- 數據安全架構設計與實戰
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 信息技術基礎:提高篇·實驗與習題
- Bug Bounty Hunting Essentials
- 網絡空間安全法律問題研究
- 從實踐中學習Nmap滲透測試
- 一本書讀透金融科技安全
- 網絡對抗的前世今生
- Hands-On Spring Security 5 for Reactive Applications
- 應用密碼學:原理、分析與Python實現
- 深入淺出密碼學
- 白話網絡安全
- 可信軟件若干關鍵技術的研究
- Building Virtual Pentesting Labs for Advanced Penetration Testing
- 黑客攻防技術寶典:Web實戰篇(第2版)
- 黑客攻防工具實戰從新手到高手(超值版)
- 互聯網安全建設從0到1
- Becoming the Hacker
- 博弈論與數據保護