- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 111字
- 2021-06-24 16:38:55
To get the most out of this book
Ensure that you have a test mobile device on which you can experiment with the techniques explained in the book. Do not try these techniques on your personal phone.
Some of the techniques explained in the book, such as rooting a device, are specific to the brand and the OS running on the device. Ensure that you research and gather sufficient information before trying these techniques.
If you are using the digital version of this book, we advise you to type the commands yourself. Doing so will help you avoid any potential errors related to the copying and pasting of code.
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- unidbg逆向工程:原理與實踐
- Kali Linux CTF Blueprints
- 工業互聯網安全防護與展望
- 大型互聯網企業安全架構
- 安全實戰之滲透測試
- 安全技術運營:方法與實踐
- .NET安全攻防指南(上冊)
- Python Penetration Testing Cookbook
- Digital Forensics with Kali Linux
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 從實踐中學習密碼安全與防護
- 華為防火墻實戰指南
- 網絡空間安全法律問題研究
- Kali Linux無線網絡滲透測試詳解