Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This updated fourth edition of Practical Mobile Forensics delves into the concepts of mobile forensics and its importance in today's world. The book focuses on teaching you the late...
Saved in:
| Main Authors: | Tamma, Rohit (Author), Skulkin, Oleg (Author), Mahalik, Heather (Author), Bommisetty, Satish (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Birmingham
Packt Publishing
2020
|
| Edition: | Fourth Edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Mobile radio communications
Published: (1996)
Published: (1996)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Software test attacks to break mobile and embedded devices
by: Hagar, Jon Duncan
Published: (2017)
by: Hagar, Jon Duncan
Published: (2017)
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024)
by: Jaswal, Nipun
Published: (2024)
Cisco router and switch forensics investigating and analyzing malicious network activity
by: Liu, Dale
Published: (2009)
by: Liu, Dale
Published: (2009)
Handbook of research on network forensics and analysis techniques
Published: (2018)
Published: (2018)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Windows forensic analysis DVD toolkit
by: Carvey, Harlan A.
Published: (2009)
by: Carvey, Harlan A.
Published: (2009)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Mobile network forensics emerging research and opportunities
by: Sharevski, Filipo 1985
Published: (2019)
by: Sharevski, Filipo 1985
Published: (2019)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Computer forensics Computer crime scene investigation
by: Vacca
Published: (2005)
by: Vacca
Published: (2005)
Windows registry forensics advanced digital forensic analysis of the windows registry
by: Carvey, Harlan
Published: (2016)
by: Carvey, Harlan
Published: (2016)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2020)
by: Nelson, Bill, et al.
Published: (2020)
The ringtone dialectic economy and cultural form
by: Gopinath, Sumanth S.
Published: (2013)
by: Gopinath, Sumanth S.
Published: (2013)
Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats
by: Johansen, Gerard
Published: (2020)
by: Johansen, Gerard
Published: (2020)
Internet forensics
by: Jones, Robert
Published: (2006)
by: Jones, Robert
Published: (2006)
Security for mobile networks and platforms
by: Aissi
Published: (2006)
by: Aissi
Published: (2006)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Guide to Computer Forensics and Investigations
by: Nelson, Bill, et al.
Published: (2016)
by: Nelson, Bill, et al.
Published: (2016)
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005)
by: Jones (Keith John)
Published: (2005)
iPhone and iOS forensics investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices
by: Hoog, Andrew, et al.
Published: (2011)
by: Hoog, Andrew, et al.
Published: (2011)
Scene of the cybercrime computer forensics
Published: (2015)
Published: (2015)
Getting started with OpenBTS build open source mobile networks
by: Iedema, Michael
Published: (2015)
by: Iedema, Michael
Published: (2015)
Digital forensics basics a practical guide using Windows OS
by: Hassan, Nihad A.
Published: (2019)
by: Hassan, Nihad A.
Published: (2019)
Security for mobility
Published: (2004)
Published: (2004)
Guide to computer forensics and investigations processing digital evidence
by: Nelson, Bill, et al.
Published: (2019)
by: Nelson, Bill, et al.
Published: (2019)
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
by: Pepe, Matthew
Published: (2014)
by: Pepe, Matthew
Published: (2014)
The art of memory forensics detecting malware and threats in Windows, Linux, and Mac memory
by: Ligh, Michael Hale, et al.
Published: (2014)
by: Ligh, Michael Hale, et al.
Published: (2014)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Teach yourself visually iPhone 8, iPhone 8 Plus, and iPhone X
by: Hart-Davis, Guy
Published: (2018)
by: Hart-Davis, Guy
Published: (2018)
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014)
by: Johnson, Leighton
Published: (2014)
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
by: Oettinger, William
Published: (2020)
by: Oettinger, William
Published: (2020)
Wireless communications security
by: Imai
Published: (2005)
by: Imai
Published: (2005)
Wireless communications security
by: Imai 1943-
Published: (2006)
by: Imai 1943-
Published: (2006)
Similar Items
-
Mobile radio communications
Published: (1996) -
Security management in mobile cloud computing
Published: (2017) -
Software test attacks to break mobile and embedded devices
by: Hagar, Jon Duncan
Published: (2017) -
Mastering Network Forensics : A practical approach to investigating and defending against network attacks /
by: Jaswal, Nipun
Published: (2024) -
Cisco router and switch forensics investigating and analyzing malicious network activity
by: Liu, Dale
Published: (2009)


