- Mastering Mobile Forensics
- Soufiane Tahiri
- 261字
- 2021-07-16 10:37:07
Preface
It's not a secret that mobile devices have evolved dramatically from being those fateful boxes to extremely advanced brains; their names have also changed from phones to smartphones.
Mobile devices are getting as powerful as personal computers and they can do almost any task that we might need on a daily basis, such as taking and sharing photos and videos, sending and receiving e-mails, checking your bank balance and making bank transactions, social networking, managing tasks and reminders, and so on. Any mobile phone is a huge repository of sensitive data related to its owner and given the pace at which mobile development is progressing, there is no doubt that the need for forensic examination of these devices is on the rise too.
Mobile forensics is a set of scientific methodologies with the goal of extracting digital evidence in a legal context. Extracting digital evidence means recovering, gathering, and analyzing data stored within the internal memory of a mobile phone. Mobile forensics is a continuously evolving science, which involves permanently evolving techniques and presents a real challenge to the forensic community and law enforcement due to the fast and unstoppable changes in technology.
There are a huge number of mobile device models that are in use today and new models are manufactured every five months, and most of them use closed operating systems, thus making the forensic process much more difficult. This book gives the forensic community an in-depth look at mobile forensic techniques by detailing methods of gathering evidence from mobile devices running on Android, iOS, and Windows Phone.
- CSO進階之路:從安全工程師到首席安全官
- INSTANT Burp Suite Starter
- Mastering Kali Linux for Advanced Penetration Testing
- 數(shù)據(jù)安全實踐指南
- 防火墻技術與應用(第2版)
- Testing and Securing Android Studio Applications
- Spring Security(Third Edition)
- 解密彩虹團隊非凡實戰(zhàn)能力:企業(yè)安全體系建設(共5冊)
- 信息安全等級保護測評與整改指導手冊
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 黑客攻防從入門到精通
- 網(wǎng)絡關鍵設備安全檢測實施指南
- 實用黑客攻防技術
- Hands-On Artificial Intelligence for Cybersecurity
- Web代碼安全漏洞深度剖析