• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Practical Forensic Analysis of Artifacts on IOS and Android Devices: Investigating Complex Mobile Devices » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Practical Forensic Analysis of Artifacts on IOS and Android Devices: Investigating Complex Mobile Devices

ISBN-13: 9781484280256 / Angielski / Miękka / 2022

Mohammed Moreb
Practical Forensic Analysis of Artifacts on IOS and Android Devices: Investigating Complex Mobile Devices Moreb, Mohammed 9781484280256 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Practical Forensic Analysis of Artifacts on IOS and Android Devices: Investigating Complex Mobile Devices

ISBN-13: 9781484280256 / Angielski / Miękka / 2022

Mohammed Moreb
cena 242,07 zł
(netto: 230,54 VAT:  5%)

Najniższa cena z 30 dni: 231,29 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings. 


You’ll walkthrough the various phases of the mobile forensics process for both Android and iOS-based devices, including forensically extracting, collecting, and analyzing data and producing and disseminating reports. Practical cases and labs involving specialized hardware and software illustrate practical application and performance of data acquisition (including deleted data) and the analysis of extracted information. You'll also gain an advanced understanding of computer forensics, focusing on mobile devices and other devices not classifiable as laptops, desktops, or servers. 

This book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role.  

What You'll Learn
  • Acquire and investigate data from mobile devices using forensically sound, industry-standard tools
  • Understand the relationship between mobile and desktop devices in criminal and corporate investigations
  • Analyze backup files and artifacts for forensic evidence
Who This Book Is For

Forensic examiners with little or basic experience in mobile forensics or open source solutions for mobile forensics. The book will also be useful to anyone seeking a deeper understanding of mobile internals.

Kategorie:
Informatyka
Kategorie BISAC:
Computers > Programming - Macintosh
Computers > Programming - Mobile Devices
Computers > Operating Systems - Mac OS
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484280256
Rok wydania:
2022
Waga:
0.83 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1

Introduction to Mobile Forensic Analysis

 

  • The Importance of Mobile Forensic Analysis
  • Understanding mobile forensics
  • Challenges in mobile forensics
  • Tools used  for mobile forensics
  • The mobile phone evidence extraction process
  • Examination and analysis
  • Rules of evidence
  • Practical Mobile Forensic
  • Summary

Chapter 2

Introduction to IOS Forensics

 

    IOS Boot Process
  • IOS Architecture 
  • IOS Security 
  • Understanding Jailbreaking
  • Data Acquisition from iOS Devices
  • Data Acquisition from iOS Backups
  • iOS Data Analysis and Recovery
  • Mobile Forensics Investigation Challenges on iOS 
  • iOS Forensic Tools
  • Summary

 

Chapter 3

Introduction to Android Forensics

 

  • Understanding Android
  • Application framework
  • Android runtime
  • Linux Kernel
  • Android Forensic Setup and Pre-Data Extraction Techniques
  • Android Data Extraction Techniques
  • Android Data Analysis and Recovery
  • Android App rooting process and techniques 
  • Summary

Chapter 4

Forensic Investigations of Popular Applications on Android and iOS platforms

 

  • Introduction
  • Case & Investigator Details
  • Investigations of Facebook Messenger and WhatsApp applications
  • Details of the device seized for examination
  • Results and Analysis
  • Summary

Chapter 5

Forensic Analysis of Telegram Messenger on iOS and Android Smartphones Case Study

 

  • Introduction
  • Literature Review
  • Methodology and Experiment Setup
  • Evidences Acquisition
  • Evidences Processing and Analysis
  • Results
  • Summary

Chapter 6

Detecting Private Data Leaks Over Mobile Applications Using Mobile Forensic Techniques

 

  • Introduction
  • Legal Issues Regarding the Local Electronic Crimes Law & Mobile Forensics 
  • Details of the reporting agency and tools used in the examination
  • Description of steps taken during examination 
  • Chain of custody documentation  
  • Details of findings or issues identified
  • Evidence recovered during the examination, ranging from chat messages 
  • Images captured during the examination
  • Examination and analysis information
  • Summary

 

Chapter 7

 Impact of iPhone Jailbreaking on User Data Integrity in Mobile  Forensics

 

Introduction  

Mobile Forensics 

User Data Integrity in Mobile  Forensics

Jailbreaking’s affect on iOS 

Data acquisition 

Logical acquisition

Filesystem acquisition

Experiment Details and Tools 

Results 

Data Extraction

Extracted data before jailbreak 

Extracted data after jailbreak 

Summary 

Chapter 8

The Impact of Cryptocurrency Mining on Mobile Devices

 

  • Introduction  
  • Cryptocurrency mining
  • Measurement and work mechanism
  • Tools, programs, and applications used in cryptocurrency mining
  • Experiment and analogy by iPhone 6s
  • Experiment and analogy by LG g5
  • Results and Analysis
  • Summary

Chapter 9

Mobile Forensic Investigation for WhatsApp

 

  • Introduction
  • WhatsApp Architecture
  • WhatsApp Experiment
  • Tools used in the seizure process
  • Analysis Stage
  • Examination on a backup taken by iTunes
  • Examination on a backup taken from the connected device
  • Forensic Tools comparison
  • Summary

Chapter 10

Cloud Computing Forensics: Dropbox Case Study

 

  • Introduction
  • Cloud Computing Forensics
  • Cloud forensic challenges
  • Dropbox cloud storage
  • Implementation Details
  • Seating Tools and Environment
  • Magnet axiom forensics program  
  • MobileEdit express forensics tool
  • FinalMobile forensics tool
  • Results and Analysis
  • Programs and tools
  • Experiments
  • Summary

Chapter 11

Malware Forensics for Volatile and nonVolatile Memory in Mobile Devices

 

  • Introduction
  • Mobile Malware Forensic
  • Smartphone Volatile Memory
  • Mobile Devices Case Details
  • Development and Experiment
  • Logical acquisition using Axiom process
  • Physical acquisition output in finalmobile forensics
  • Investigating from the non-volatile memory
  • Evaluate Forensic tools usage in this case
  • Summary

Chapter 12

Mobile Forensic for KeyLogger Artifact

 

  • Introduction
  • Mobile KeyLogger
  • Methodology and case study setup
  • Mobile Malware and Spyware
  • Evidence recovered during the examination
  • Evidence recovered using Magnet ACQUIRE
  • Examination and analysis KeyLogger result
  • Summary

 

 

Chapter 13

Digital Evidence Identification Methods for Mobile Devices with Facebook Messenger

 

  • Introduction
  • Mobile messenger apps
  • Mobile operating system architecture
  • Experiment Tools
  • Evidence and scene security
  • Evidence isolation
  • Data Acquisition
  • FBM Data analysis using Magnet AXIOM Examine
  • FBM Data analysis using Belkasoft
  • FBM Data analysis using DB Browser for SQLite
  • Recover deleted evidence from SQLite Property Lists
  • Reporting
  • Summary

Mohammed Moreb, Ph.D. in Electrical and Computer Engineering. Expertise in Cybercrimes & Digital Evidence Analysis, specifically focusing on Information and Network Security, with a strong publication track record, work for both conceptual and practical wich built during works as a system developer and administrator for the data center for more than 10 years, config, install, and admin enterprise system related to all security configuration, he improved his academic path with the international certificate such as CCNA, MCAD, MCSE; Academically he teaches the graduate-level courses such as Information and Network Security course, Mobile Forensics course, Advanced Research Methods, Computer Network Analysis and Design, and Artificial Intelligence Strategy for Business Leaders.

Dr. Moreb recently founded a new framework and methodology specialized in software engineering for machine learning in health informatics named SEMLHI which investigates the interaction between software engineering and machine learning within the context of health systems. The SEMLHI framework includes four modules (software, machine learning, machine learning algorithms, and health informatics data) that organize the tasks in the framework using a SEMLHI methodology, thereby enabling researchers and developers to analyze health informatics software from an engineering perspective and providing developers with a new road map for designing health applications with system functions and software implementations.


Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings. 


You’ll walkthrough the various phases of the mobile forensics process for both Android and iOS-based devices, including forensically extracting, collecting, and analyzing data and producing and disseminating reports. Practical cases and labs involving specialized hardware and software illustrate practical application and performance of data acquisition (including deleted data) and the analysis of extracted information. You'll also gain an advanced understanding of computer forensics, focusing on mobile devices and other devices not classifiable as laptops, desktops, or servers. 

This book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role.  

You will:
  • Acquire and investigate data from mobile devices using forensically sound, industry-standard tools
  • Understand the relationship between mobile and desktop devices in criminal and corporate investigations
  • Analyze backup files and artifacts for forensic evidence



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia