Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Forensics: Advanced Investigative Strategies

Buy

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience

Book Description

Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work.

We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence.

By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud.

What you will learn

  • Understand the challenges of mobile forensics
  • Grasp how to properly deal with digital evidence
  • Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices
  • Know what forensic outcome to expect under given circumstances
  • Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods
  • Get in-depth knowledge of the different acquisition methods for all major mobile platforms
  • Discover important mobile acquisition tools and techniques for all of the major platforms

About the Author

Oleg Afonin is a researcher and an expert in digital forensics. He is a frequent speaker at industry-known conferences such as CEIC, HTCIA, FT-Day, Techno Forensics, and others. Oleg has co-authored multiple publications on IT security and mobile forensics. With years of experience in the digital forensics and security domain, Oleg has led forensic training courses for law enforcement departments in multiple countries.

Vladimir Katalov is CEO, co-founder, and co-owner of ElcomSoft Co. Ltd. Vladimir manages all technical research and product development in the company. He regularly presents at various events and regularly runs security and computer forensics training both for foreign and domestic (Russian) computer investigative committees and other law enforcement organizations.

Table of Contents

  1. Introducing Mobile Forensics
  2. Acquisition Methods Overview
  3. Acquisition – Approaching Android Devices
  4. Practical Steps to Android Acquisition
  5. iOS – Introduction and Physical Acquisition
  6. iOS Logical and Cloud Acquisition
  7. Acquisition – Approaching Windows Phone and Windows 10 Mobile
  8. Acquisition – Approaching Windows 8, 8.1, 10, and RT Tablets
  9. Acquisition – Approaching BlackBerry
  10. Dealing with Issues, Obstacles, and Special Cases
  11. Mobile Forensic Tools and Case Studies
(HTML tags aren't allowed.)

Object-Oriented JavaScript: Learn everything you need to know about object-oriented JavaScript (OOJS), 3rd Edition
Object-Oriented JavaScript: Learn everything you need to know about object-oriented JavaScript (OOJS), 3rd Edition

Learn everything you need to know about object-oriented JavaScript with this comprehensive guide. Enter the world of cutting-edge development!

Key Features

  • This book has been updated to cover all the new object-oriented features introduced in ECMAScript 6
  • It makes object-oriented...
Modern Data Science with R (Chapman & Hall/CRC Texts in Statistical Science)
Modern Data Science with R (Chapman & Hall/CRC Texts in Statistical Science)

Modern Data Science with R is a comprehensive data science textbook for undergraduates that incorporates statistical and computational thinking to solve real-world problems with data. Rather than focus exclusively on case studies or programming syntax, this book illustrates how statistical programming in the...

Java Data Science Cookbook
Java Data Science Cookbook

Key Features

  • This book provides modern recipes in small steps to help an apprentice cook become a master chef in data science
  • Use these recipes to obtain, clean, analyze, and learn from your data
  • Learn how to get your data science applications to production and enterprise...

Polymorphism in Java: Methods and polymorphic algorithms applied to computer games
Polymorphism in Java: Methods and polymorphic algorithms applied to computer games
The creation of polymorphic algorithms is a necessary skill for programmers who intend to write reusable code. This book stands out for teaching programming based on polymorphism. Abundant examples in Java code and illustrative graphics of the main ideas related to the topic: Polymorphism in Java. The book "Polymorphism in Java" aims...
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Raspberry Pi For Kids For Dummies
Raspberry Pi For Kids For Dummies
Getting acquainted with your Raspberry Pi has never been sweeter

Raspberry Pi For Kids For Dummies makes it easy for kids to set-up, operate, and troubleshoot like a Pi pro! Introducing you to Pi through a series of entertaining and inspiring projects, this handy, step-by-step guide shows you how to write computer...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy