Mastering Mobile Forensics

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Mastering Mobile Forensics by Soufiane Tahiri, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Soufiane Tahiri ISBN: 9781785281068
Publisher: Packt Publishing Publication: May 30, 2016
Imprint: Packt Publishing Language: English
Author: Soufiane Tahiri
ISBN: 9781785281068
Publisher: Packt Publishing
Publication: May 30, 2016
Imprint: Packt Publishing
Language: English

Develop the capacity to dig deeper into mobile device data acquisition

About This Book

  • A mastering guide to help you overcome the roadblocks you face when dealing with mobile forensics
  • Excel at the art of extracting data, recovering deleted data, bypassing screen locks, and much more
  • Get best practices to how to collect and analyze mobile device data and accurately document your investigations

Who This Book Is For

The book is for mobile forensics professionals who have experience in handling forensic tools and methods. This book is designed for skilled digital forensic examiners, mobile forensic investigators, and law enforcement officers.

What You Will Learn

  • Understand the mobile forensics process model and get guidelines on mobile device forensics
  • Acquire in-depth knowledge about smartphone acquisition and acquisition methods
  • Gain a solid understanding of the architecture of operating systems, file formats, and mobile phone internal memory
  • Explore the topics of of mobile security, data leak, and evidence recovery
  • Dive into advanced topics such as GPS analysis, file carving, encryption, encoding, unpacking, and decompiling mobile application processes

In Detail

Mobile forensics presents a real challenge to the forensic community due to the fast and unstoppable changes in technology. This book aims to provide the forensic community an in-depth insight into mobile forensic techniques when it comes to deal with recent smartphones operating systems

Starting with a brief overview of forensic strategies and investigation procedures, you will understand the concepts of file carving, GPS analysis, and string analyzing. You will also see the difference between encryption, encoding, and hashing methods and get to grips with the fundamentals of reverse code engineering. Next, the book will walk you through the iOS, Android and Windows Phone architectures and filesystem, followed by showing you various forensic approaches and data gathering techniques.

You will also explore advanced forensic techniques and find out how to deal with third-applications using case studies. The book will help you master data acquisition on Windows Phone 8. By the end of this book, you will be acquainted with best practices and the different models used in mobile forensics.

Style and approach

The book is a comprehensive guide that will help the IT forensics community to go more in-depth into the investigation process and mobile devices take-over.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Develop the capacity to dig deeper into mobile device data acquisition

About This Book

Who This Book Is For

The book is for mobile forensics professionals who have experience in handling forensic tools and methods. This book is designed for skilled digital forensic examiners, mobile forensic investigators, and law enforcement officers.

What You Will Learn

In Detail

Mobile forensics presents a real challenge to the forensic community due to the fast and unstoppable changes in technology. This book aims to provide the forensic community an in-depth insight into mobile forensic techniques when it comes to deal with recent smartphones operating systems

Starting with a brief overview of forensic strategies and investigation procedures, you will understand the concepts of file carving, GPS analysis, and string analyzing. You will also see the difference between encryption, encoding, and hashing methods and get to grips with the fundamentals of reverse code engineering. Next, the book will walk you through the iOS, Android and Windows Phone architectures and filesystem, followed by showing you various forensic approaches and data gathering techniques.

You will also explore advanced forensic techniques and find out how to deal with third-applications using case studies. The book will help you master data acquisition on Windows Phone 8. By the end of this book, you will be acquainted with best practices and the different models used in mobile forensics.

Style and approach

The book is a comprehensive guide that will help the IT forensics community to go more in-depth into the investigation process and mobile devices take-over.

More books from Packt Publishing

Cover of the book VMware vSphere 6.x Datacenter Design Cookbook - Second Edition by Soufiane Tahiri
Cover of the book Moodle JavaScript Cookbook by Soufiane Tahiri
Cover of the book Mastering Selenium WebDriver by Soufiane Tahiri
Cover of the book Instant VMware Player for Virtualization by Soufiane Tahiri
Cover of the book Intelligent Mobile Projects with TensorFlow by Soufiane Tahiri
Cover of the book Mastering Visual Studio 2017 by Soufiane Tahiri
Cover of the book Advanced Penetration Testing for Highly-Secured Environments - Second Edition by Soufiane Tahiri
Cover of the book Yii 1.1 Application Development Cookbook by Soufiane Tahiri
Cover of the book Hands-On Artificial Intelligence with Unreal Engine by Soufiane Tahiri
Cover of the book Machine Learning for Mobile by Soufiane Tahiri
Cover of the book HornetQ Messaging Developers Guide by Soufiane Tahiri
Cover of the book Julia Programming Projects by Soufiane Tahiri
Cover of the book Developing Java Applications with Spring and Spring Boot by Soufiane Tahiri
Cover of the book iOS Forensics Cookbook by Soufiane Tahiri
Cover of the book Learning Raspbian by Soufiane Tahiri
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy