Android Forensics

Investigation, Analysis and Mobile Security for Google Android

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Android Forensics by Andrew Hoog, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Andrew Hoog ISBN: 9781597496520
Publisher: Elsevier Science Publication: July 21, 2011
Imprint: Syngress Language: English
Author: Andrew Hoog
ISBN: 9781597496520
Publisher: Elsevier Science
Publication: July 21, 2011
Imprint: Syngress
Language: English

Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis require d. this book is ideal for the classroom as it teaches readers not only how to forensically acquire Android devices but also how to apply actual forensic techniques to recover data.

The book lays a heavy emphasis on open source tools and step-by-step examples and includes information about Android applications needed for forensic investigations. It is organized into seven chapters that cover the history of the Android platform and its internationalization; the Android Open Source Project (AOSP) and the Android Market; a brief tutorial on Linux and Android forensics; and how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to examine an acquired Android device.

Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. It will also appeal to computer forensic and incident response professionals, including commercial/private sector contractors, consultants, and those in federal government.

  • Named a 2011 Best Digital Forensics Book by InfoSec Reviews
  • Ability to forensically acquire Android devices using the techniques outlined in the book
  • Detailed information about Android applications needed for forensics investigations
  • Important information about SQLite, a file based structured data storage relevant for both Android and many other platforms.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis require d. this book is ideal for the classroom as it teaches readers not only how to forensically acquire Android devices but also how to apply actual forensic techniques to recover data.

The book lays a heavy emphasis on open source tools and step-by-step examples and includes information about Android applications needed for forensic investigations. It is organized into seven chapters that cover the history of the Android platform and its internationalization; the Android Open Source Project (AOSP) and the Android Market; a brief tutorial on Linux and Android forensics; and how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to examine an acquired Android device.

Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. It will also appeal to computer forensic and incident response professionals, including commercial/private sector contractors, consultants, and those in federal government.

More books from Elsevier Science

Cover of the book European Electricity Systems in Transition by Andrew Hoog
Cover of the book Practical Guide to Vegetable Oil Processing by Andrew Hoog
Cover of the book Corrosion Engineering by Andrew Hoog
Cover of the book Earth as an Evolving Planetary System by Andrew Hoog
Cover of the book Functionalized Graphene Nanocomposites and Their Derivatives by Andrew Hoog
Cover of the book Plant Transcription Factors by Andrew Hoog
Cover of the book From the Files of a Security Expert Witness by Andrew Hoog
Cover of the book Methods for Studying Mononuclear Phagocytes by Andrew Hoog
Cover of the book Evolutionary Origins and Early Development of Number Processing by Andrew Hoog
Cover of the book Supercritical Fluid Chromatography by Andrew Hoog
Cover of the book Distributed Learning by Andrew Hoog
Cover of the book Highway Bridge Maintenance Planning and Scheduling by Andrew Hoog
Cover of the book Optimizing Optimization by Andrew Hoog
Cover of the book Digital Humanities, Libraries, and Partnerships by Andrew Hoog
Cover of the book Case Studies in Food Safety and Authenticity by Andrew Hoog
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy