- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 77字
- 2021-06-24 16:39:06
Data protection
Data protection is designed to protect data at rest and to make offline attacks difficult. It allows applications to leverage the user's device passcode, in concert with the device hardware encryption, to generate a strong encryption key. Later, the strong encryption key is used to encrypt the data stored on the disk. This key protects data from unauthorized access when the device is locked, so critical information is secured even if the device is compromised.
推薦閱讀
- RESTful Java Web Services Security
- 數(shù)據(jù)恢復(fù)方法及案例分析
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- Metasploit Penetration Testing Cookbook(Second Edition)
- 工業(yè)互聯(lián)網(wǎng)安全
- Penetration Testing with Perl
- 代碼審計(jì):企業(yè)級(jí)Web代碼安全架構(gòu)
- Kali Linux Wireless Penetration Testing Cookbook
- 網(wǎng)絡(luò)安全技術(shù)與實(shí)訓(xùn)(第4版)(微課版)
- 硬黑客:智能硬件生死之戰(zhàn)
- 解密彩虹團(tuán)隊(duì)非凡實(shí)戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊(cè))
- CTF那些事兒
- 先進(jìn)云安全研究與實(shí)踐
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 信息安全工程與實(shí)踐