Mobile Forensics – Advanced Investigative Strategies

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Mobile Forensics – Advanced Investigative Strategies by Vladimir Katalov, Oleg Afonin, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Vladimir Katalov, Oleg Afonin ISBN: 9781786464088
Publisher: Packt Publishing Publication: September 30, 2016
Imprint: Packt Publishing Language: English
Author: Vladimir Katalov, Oleg Afonin
ISBN: 9781786464088
Publisher: Packt Publishing
Publication: September 30, 2016
Imprint: Packt Publishing
Language: English

Master powerful strategies to acquire and analyze evidence from real-life scenarios

About This Book

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience

Who This Book Is For

This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required.

What You Will Learn

  • Understand the challenges of mobile forensics
  • Grasp how to properly deal with digital evidence
  • Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices
  • Know what forensic outcome to expect under given circumstances
  • Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods
  • Get in-depth knowledge of the different acquisition methods for all major mobile platforms
  • Discover important mobile acquisition tools and techniques for all of the major platforms

In Detail

Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work.

We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence.

By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud.

Style and approach

This book takes a unique strategy-based approach, executing them on real-world scenarios. You will be introduced to thinking in terms of "game plans," which are essential to succeeding in analyzing evidence and conducting investigations.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Master powerful strategies to acquire and analyze evidence from real-life scenarios

About This Book

Who This Book Is For

This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required.

What You Will Learn

In Detail

Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work.

We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence.

By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud.

Style and approach

This book takes a unique strategy-based approach, executing them on real-world scenarios. You will be introduced to thinking in terms of "game plans," which are essential to succeeding in analyzing evidence and conducting investigations.

More books from Packt Publishing

Cover of the book Intelligent IoT Projects in 7 Days by Vladimir Katalov, Oleg Afonin
Cover of the book Leap Motion Development Essentials by Vladimir Katalov, Oleg Afonin
Cover of the book Python: Data Analytics and Visualization by Vladimir Katalov, Oleg Afonin
Cover of the book Machine Learning for Finance by Vladimir Katalov, Oleg Afonin
Cover of the book Learning ROS for Robotics Programming - Second Edition by Vladimir Katalov, Oleg Afonin
Cover of the book Microsoft System Center Orchestrator 2012 R2 Essentials by Vladimir Katalov, Oleg Afonin
Cover of the book Responsive Web Design with AngularJS by Vladimir Katalov, Oleg Afonin
Cover of the book Joomla! 3 Template Essentials by Vladimir Katalov, Oleg Afonin
Cover of the book Java EE 8 Microservices by Vladimir Katalov, Oleg Afonin
Cover of the book Hands-On Reinforcement Learning with PyTorch 1.0 by Vladimir Katalov, Oleg Afonin
Cover of the book Scala High Performance Programming by Vladimir Katalov, Oleg Afonin
Cover of the book Security Automation with Ansible 2 by Vladimir Katalov, Oleg Afonin
Cover of the book Learning Veeam® Backup & Replication for VMware vSphere by Vladimir Katalov, Oleg Afonin
Cover of the book UX Design for Mobile by Vladimir Katalov, Oleg Afonin
Cover of the book Redis Applied Design Patterns by Vladimir Katalov, Oleg Afonin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy