Android forensics: investigation, analysis, and mobile security for Google Android
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
©2011
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes bibliographical references and index The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, data storage and other low-level functions). Finally, it will focus on teaching readers how to apply actual forensic techniques to recover data. Ability to forensically acquire Android devices using the techniques outlined in the book Detailed information about Android applications needed for forensics investigations Important information about SQLite, a file based structured data storage relevant for both Android and many other platforms |
Beschreibung: | 1 Online-Ressource (xix, 372 pages) |
ISBN: | 9781597496520 1597496529 9781597496513 1597496510 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042297707 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597496520 |c electronic bk. |9 978-1-59749-652-0 | ||
020 | |a 1597496529 |c electronic bk. |9 1-59749-652-9 | ||
020 | |a 9781597496513 |9 978-1-59749-651-3 | ||
020 | |a 1597496510 |9 1-59749-651-0 | ||
035 | |a (ZDB-33-EBS)ocn751987663 | ||
035 | |a (OCoLC)751987663 | ||
035 | |a (DE-599)BVBBV042297707 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.4/46 |2 23 | |
100 | 1 | |a Hoog, Andrew |e Verfasser |4 aut | |
245 | 1 | 0 | |a Android forensics |b investigation, analysis, and mobile security for Google Android |c Andrew Hoog ; John McCash, technical editor |
264 | 1 | |a Waltham, MA |b Syngress |c ©2011 | |
300 | |a 1 Online-Ressource (xix, 372 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, data storage and other low-level functions). Finally, it will focus on teaching readers how to apply actual forensic techniques to recover data. Ability to forensically acquire Android devices using the techniques outlined in the book Detailed information about Android applications needed for forensics investigations Important information about SQLite, a file based structured data storage relevant for both Android and many other platforms | ||
630 | 0 | 4 | |a Android (Electronic resource) |
630 | 0 | 4 | |a Google |
650 | 4 | |a Android (Electronic resource) | |
650 | 4 | |a Computer crimes / Investigation | |
650 | 4 | |a Google | |
650 | 4 | |a Smartphones / Security measures | |
650 | 4 | |a Engineering | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Computer science | |
650 | 4 | |a Mobile computing / Security measures | |
650 | 4 | |a Data recovery (Computer science) | |
650 | 4 | |a Forensic sciences / Data processing | |
650 | 7 | |a COMPUTERS / Operating Systems / DOS. |2 bisacsh | |
650 | 7 | |a COMPUTERS / Operating Systems / Macintosh |2 bisacsh | |
650 | 7 | |a COMPUTERS / Operating Systems / Windows Server & NT. |2 bisacsh | |
650 | 7 | |a COMPUTERS / Operating Systems / Windows Workstation |2 bisacsh | |
650 | 7 | |a COMPUTERS / System Administration / Windows Administration |2 bisacsh | |
650 | 7 | |a Android (Electronic resource) |2 blmlsh | |
650 | 7 | |a Google |2 blmlsh | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Informatik | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Smartphones |x Security measures | |
650 | 4 | |a Mobile computing |x Security measures | |
650 | 4 | |a Data recovery (Computer science) | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Forensic sciences |x Data processing | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Android |g Systemplattform |0 (DE-588)7635475-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Android |g Systemplattform |0 (DE-588)7635475-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a McCash, John |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496513 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027734750 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804152872875589632 |
---|---|
any_adam_object | |
author | Hoog, Andrew |
author_facet | Hoog, Andrew |
author_role | aut |
author_sort | Hoog, Andrew |
author_variant | a h ah |
building | Verbundindex |
bvnumber | BV042297707 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn751987663 (OCoLC)751987663 (DE-599)BVBBV042297707 |
dewey-full | 005.4/46 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.4/46 |
dewey-search | 005.4/46 |
dewey-sort | 15.4 246 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04088nmm a2200793zc 4500</leader><controlfield tag="001">BV042297707</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496520</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-652-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496529</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-652-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496513</subfield><subfield code="9">978-1-59749-651-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496510</subfield><subfield code="9">1-59749-651-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn751987663</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)751987663</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042297707</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.4/46</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hoog, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Android forensics</subfield><subfield code="b">investigation, analysis, and mobile security for Google Android</subfield><subfield code="c">Andrew Hoog ; John McCash, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 372 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, data storage and other low-level functions). Finally, it will focus on teaching readers how to apply actual forensic techniques to recover data. Ability to forensically acquire Android devices using the techniques outlined in the book Detailed information about Android applications needed for forensics investigations Important information about SQLite, a file based structured data storage relevant for both Android and many other platforms</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Android (Electronic resource)</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Google</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Android (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Google</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Smartphones / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data recovery (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences / Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Operating Systems / DOS.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Operating Systems / Macintosh</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Operating Systems / Windows Server & NT.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Operating Systems / Windows Workstation</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / System Administration / Windows Administration</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Android (Electronic resource)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Google</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Smartphones</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data recovery (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Android</subfield><subfield code="g">Systemplattform</subfield><subfield code="0">(DE-588)7635475-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Android</subfield><subfield code="g">Systemplattform</subfield><subfield code="0">(DE-588)7635475-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McCash, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496513</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027734750</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV042297707 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:37Z |
institution | BVB |
isbn | 9781597496520 1597496529 9781597496513 1597496510 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027734750 |
oclc_num | 751987663 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xix, 372 pages) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Hoog, Andrew Verfasser aut Android forensics investigation, analysis, and mobile security for Google Android Andrew Hoog ; John McCash, technical editor Waltham, MA Syngress ©2011 1 Online-Ressource (xix, 372 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, data storage and other low-level functions). Finally, it will focus on teaching readers how to apply actual forensic techniques to recover data. Ability to forensically acquire Android devices using the techniques outlined in the book Detailed information about Android applications needed for forensics investigations Important information about SQLite, a file based structured data storage relevant for both Android and many other platforms Android (Electronic resource) Computer crimes / Investigation Smartphones / Security measures Engineering Electrical engineering Computer science Mobile computing / Security measures Data recovery (Computer science) Forensic sciences / Data processing COMPUTERS / Operating Systems / DOS. bisacsh COMPUTERS / Operating Systems / Macintosh bisacsh COMPUTERS / Operating Systems / Windows Server & NT. bisacsh COMPUTERS / Operating Systems / Windows Workstation bisacsh COMPUTERS / System Administration / Windows Administration bisacsh Android (Electronic resource) blmlsh Google blmlsh Datenverarbeitung Informatik Ingenieurwissenschaften Smartphones Security measures Mobile computing Security measures Computer crimes Investigation Forensic sciences Data processing Computersicherheit (DE-588)4274324-2 gnd rswk-swf Android Systemplattform (DE-588)7635475-1 gnd rswk-swf Android Systemplattform (DE-588)7635475-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 McCash, John Sonstige oth http://www.sciencedirect.com/science/book/9781597496513 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Hoog, Andrew Android forensics investigation, analysis, and mobile security for Google Android Android (Electronic resource) Computer crimes / Investigation Smartphones / Security measures Engineering Electrical engineering Computer science Mobile computing / Security measures Data recovery (Computer science) Forensic sciences / Data processing COMPUTERS / Operating Systems / DOS. bisacsh COMPUTERS / Operating Systems / Macintosh bisacsh COMPUTERS / Operating Systems / Windows Server & NT. bisacsh COMPUTERS / Operating Systems / Windows Workstation bisacsh COMPUTERS / System Administration / Windows Administration bisacsh Android (Electronic resource) blmlsh Google blmlsh Datenverarbeitung Informatik Ingenieurwissenschaften Smartphones Security measures Mobile computing Security measures Computer crimes Investigation Forensic sciences Data processing Computersicherheit (DE-588)4274324-2 gnd Android Systemplattform (DE-588)7635475-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7635475-1 |
title | Android forensics investigation, analysis, and mobile security for Google Android |
title_auth | Android forensics investigation, analysis, and mobile security for Google Android |
title_exact_search | Android forensics investigation, analysis, and mobile security for Google Android |
title_full | Android forensics investigation, analysis, and mobile security for Google Android Andrew Hoog ; John McCash, technical editor |
title_fullStr | Android forensics investigation, analysis, and mobile security for Google Android Andrew Hoog ; John McCash, technical editor |
title_full_unstemmed | Android forensics investigation, analysis, and mobile security for Google Android Andrew Hoog ; John McCash, technical editor |
title_short | Android forensics |
title_sort | android forensics investigation analysis and mobile security for google android |
title_sub | investigation, analysis, and mobile security for Google Android |
topic | Android (Electronic resource) Computer crimes / Investigation Smartphones / Security measures Engineering Electrical engineering Computer science Mobile computing / Security measures Data recovery (Computer science) Forensic sciences / Data processing COMPUTERS / Operating Systems / DOS. bisacsh COMPUTERS / Operating Systems / Macintosh bisacsh COMPUTERS / Operating Systems / Windows Server & NT. bisacsh COMPUTERS / Operating Systems / Windows Workstation bisacsh COMPUTERS / System Administration / Windows Administration bisacsh Android (Electronic resource) blmlsh Google blmlsh Datenverarbeitung Informatik Ingenieurwissenschaften Smartphones Security measures Mobile computing Security measures Computer crimes Investigation Forensic sciences Data processing Computersicherheit (DE-588)4274324-2 gnd Android Systemplattform (DE-588)7635475-1 gnd |
topic_facet | Android (Electronic resource) Computer crimes / Investigation Smartphones / Security measures Engineering Electrical engineering Computer science Mobile computing / Security measures Data recovery (Computer science) Forensic sciences / Data processing COMPUTERS / Operating Systems / DOS. COMPUTERS / Operating Systems / Macintosh COMPUTERS / Operating Systems / Windows Server & NT. COMPUTERS / Operating Systems / Windows Workstation COMPUTERS / System Administration / Windows Administration Datenverarbeitung Informatik Ingenieurwissenschaften Smartphones Security measures Mobile computing Security measures Computer crimes Investigation Forensic sciences Data processing Computersicherheit Android Systemplattform |
url | http://www.sciencedirect.com/science/book/9781597496513 |
work_keys_str_mv | AT hoogandrew androidforensicsinvestigationanalysisandmobilesecurityforgoogleandroid AT mccashjohn androidforensicsinvestigationanalysisandmobilesecurityforgoogleandroid |