Practical mobile forensics :: dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide /
The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Pub.,
2014.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is re. |
Beschreibung: | 1 online resource (1 volume) : illustrations. |
ISBN: | 9781783288328 1783288329 1783288310 9781783288311 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn888036062 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 140820s2014 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d DEBBG |d DEBSZ |d EBLCP |d IDEBK |d N$T |d E7B |d YDXCP |d COO |d OCLCF |d TEFOD |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d ICA |d MERUC |d OCLCQ |d OCLCO |d D6H |d OCL |d VTS |d CEF |d NLE |d STF |d OCLCA |d UKMGB |d OCLCQ |d OCLCO |d G3B |d DKC |d AU@ |d OCLCQ |d M8D |d UKAHL |d VT2 |d OCLCQ |d OCLCO |d OCLCQ |d K6U |d OCLCO |d OCLCQ |d INARC |d OCLCO |d OCLCL |d OCLCQ |d OCLCO | ||
016 | 7 | |a 018006612 |2 Uk | |
019 | |a 884646805 | ||
020 | |a 9781783288328 | ||
020 | |a 1783288329 | ||
020 | |a 1783288310 | ||
020 | |a 9781783288311 | ||
020 | |z 9781783288311 | ||
035 | |a (OCoLC)888036062 |z (OCoLC)884646805 | ||
037 | |a CL0500000466 |b Safari Books Online | ||
037 | |a B903E018-D692-469B-BD23-56C28E2B4BDC |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.59 |b .B666 2014 | |
072 | 7 | |a TEC |x 009070 |2 bisacsh | |
082 | 7 | |a 621.38456 | |
049 | |a MAIN | ||
100 | 1 | |a Bommisetty, Satish. | |
245 | 1 | 0 | |a Practical mobile forensics : |b dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / |c Satish Bommisetty, Rohit Tamma, Heather Mahalik. |
260 | |a Birmingham, UK : |b Packt Pub., |c 2014. | ||
300 | |a 1 online resource (1 volume) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from cover (Safari, viewed August 13, 2014). | |
505 | 0 | |a Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Mobile Forensics; Mobile forensics; Mobile forensic challenges; Mobile phone evidence extraction process; The evidence intake phase; The identification phase; The legal authority; The goals of the examination; The make, model, and identifying information for the device; Removable and external data storage; Other sources of potential evidence; The preparation phase; The isolation phase; The processing phase; The verification phase. | |
505 | 8 | |a Comparing extracted data to the handset dataUsing multiple tools and comparing the results; Using hash values; The document and reporting phase; The presentation phase; The archiving phase; Practical mobile forensic approaches; Mobile operating systems overview; Android; iOS; Windows phone; BlackBerry OS; Mobile forensic tool leveling system; Manual extraction; Logical extraction; Hex dump; Chip-off; Micro read; Data acquisition methods; Physical acquisition; Logical acquisition; Manual acquisition; Potential evidence stored on mobile phones; Rules of evidence; Admissible; Authentic; Complete. | |
505 | 8 | |a ReliableBelievable; Good forensic practices; Securing the evidence; Preserving the evidence; Documenting the evidence; Documenting all changes; Summary; Chapter 2: Understanding the Internals of iOS Devices; iPhone models; iPhone hardware; iPad models; iPad hardware; File system; The HFS Plus file system; The HFS Plus volume; Disk layout; iPhone operating system; iOS history; 1.x -- the first iPhone; 2.x -- App Store and 3G; 3.x -- the first iPad; 4.x -- Game Center and multitasking; 5.x -- Siri and iCloud; 6.x -- Apple Maps; 7.x -- the iPhone 5S and beyond; The iOS architecture. | |
505 | 8 | |a The Cocoa Touch layerThe Media layer; The Core Services layer; The Core OS layer; iOS security; Passcode; Code signing; Sandboxing; Encryption; Data protection; Address Space Layout Randomization; Privilege separation; Stack smashing protection; Data execution prevention; Data wipe; Activation Lock; App Store; Jailbreaking; Summary; Chapter 3: Data Acquisition from iOS Devices; Operating modes of iOS devices; Normal mode; Recovery mode; DFU mode; Physical acquisition; Acquisition via a custom ramdisk; The forensic environment setup; Downloading and installing the ldid tool. | |
505 | 8 | |a Verifying the codesign_allocate tool pathInstalling OSXFuse; Installing Python modules; Downloading iPhone Data Protection Tools; Building the IMG3FS tool; Downloading redsn0w; Creating and loading the forensic toolkit; Downloading the iOS firmware file; Modifying the kernel; Building a custom ramdisk; Booting the custom ramdisk; Establishing communication with the device; Bypassing the passcode; Imaging the data partition; Decrypting the data partition; Recovering the deleted data; Acquisition via jailbreaking; Summary; Chapter 4: Data Acquisition from iOS Backups; iTunes backup. | |
520 | |a The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is re. | ||
630 | 0 | 0 | |a Android (Electronic resource) |0 http://id.loc.gov/authorities/names/n2009043077 |
630 | 0 | 0 | |a Microsoft Windows (Computer file) |
630 | 0 | 0 | |a iOS (Electronic resource) |0 http://id.loc.gov/authorities/names/n2010039603 |
630 | 0 | 7 | |a Android (Electronic resource) |2 blmlsh |
630 | 0 | 7 | |a Microsoft Windows (Computer file) |2 blmlsh |
630 | 0 | 7 | |a IOS (Electronic resource) |2 blmlsh |
630 | 0 | 7 | |a Android (Electronic resource) |2 fast |
630 | 0 | 7 | |a iOS (Electronic resource) |2 fast |
630 | 0 | 7 | |a Microsoft Windows (Computer file) |2 fast |
650 | 0 | |a BlackBerry (Smartphone) |0 http://id.loc.gov/authorities/subjects/sh2002007882 | |
650 | 0 | |a Mobile computing |x Security measures. | |
650 | 0 | |a Cell phone systems |x Security measures. | |
650 | 6 | |a BlackBerry (Téléphone intelligent) | |
650 | 6 | |a Informatique mobile |x Sécurité |x Mesures. | |
650 | 6 | |a Téléphonie cellulaire |x Sécurité |x Mesures. | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Mechanical. |2 bisacsh | |
650 | 7 | |a BlackBerry (Smartphone) |2 fast | |
700 | 1 | |a Tamma, Rohit. | |
700 | 1 | |a Mahalik, Heather. | |
758 | |i has work: |a Practical Mobile Forensics (Text) |1 https://id.oclc.org/worldcat/entity/E39PCY7K8GK9JxmK8GtfxxFhH3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Bommisetty, Satish. |t Practical Mobile Forensics. |d Birmingham : Packt Publishing, ©2014 |z 9781783288311 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=816517 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH26072545 | ||
938 | |a EBSCOhost |b EBSC |n 816517 | ||
938 | |a Internet Archive |b INAR |n practicalmobilef0000bomm_e3f7 | ||
938 | |a YBP Library Services |b YANK |n 11629331 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn888036062 |
---|---|
_version_ | 1816882282887118849 |
adam_text | |
any_adam_object | |
author | Bommisetty, Satish |
author2 | Tamma, Rohit Mahalik, Heather |
author2_role | |
author2_variant | r t rt h m hm |
author_facet | Bommisetty, Satish Tamma, Rohit Mahalik, Heather |
author_role | |
author_sort | Bommisetty, Satish |
author_variant | s b sb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.59 .B666 2014 |
callnumber-search | QA76.59 .B666 2014 |
callnumber-sort | QA 276.59 B666 42014 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Mobile Forensics; Mobile forensics; Mobile forensic challenges; Mobile phone evidence extraction process; The evidence intake phase; The identification phase; The legal authority; The goals of the examination; The make, model, and identifying information for the device; Removable and external data storage; Other sources of potential evidence; The preparation phase; The isolation phase; The processing phase; The verification phase. Comparing extracted data to the handset dataUsing multiple tools and comparing the results; Using hash values; The document and reporting phase; The presentation phase; The archiving phase; Practical mobile forensic approaches; Mobile operating systems overview; Android; iOS; Windows phone; BlackBerry OS; Mobile forensic tool leveling system; Manual extraction; Logical extraction; Hex dump; Chip-off; Micro read; Data acquisition methods; Physical acquisition; Logical acquisition; Manual acquisition; Potential evidence stored on mobile phones; Rules of evidence; Admissible; Authentic; Complete. ReliableBelievable; Good forensic practices; Securing the evidence; Preserving the evidence; Documenting the evidence; Documenting all changes; Summary; Chapter 2: Understanding the Internals of iOS Devices; iPhone models; iPhone hardware; iPad models; iPad hardware; File system; The HFS Plus file system; The HFS Plus volume; Disk layout; iPhone operating system; iOS history; 1.x -- the first iPhone; 2.x -- App Store and 3G; 3.x -- the first iPad; 4.x -- Game Center and multitasking; 5.x -- Siri and iCloud; 6.x -- Apple Maps; 7.x -- the iPhone 5S and beyond; The iOS architecture. The Cocoa Touch layerThe Media layer; The Core Services layer; The Core OS layer; iOS security; Passcode; Code signing; Sandboxing; Encryption; Data protection; Address Space Layout Randomization; Privilege separation; Stack smashing protection; Data execution prevention; Data wipe; Activation Lock; App Store; Jailbreaking; Summary; Chapter 3: Data Acquisition from iOS Devices; Operating modes of iOS devices; Normal mode; Recovery mode; DFU mode; Physical acquisition; Acquisition via a custom ramdisk; The forensic environment setup; Downloading and installing the ldid tool. Verifying the codesign_allocate tool pathInstalling OSXFuse; Installing Python modules; Downloading iPhone Data Protection Tools; Building the IMG3FS tool; Downloading redsn0w; Creating and loading the forensic toolkit; Downloading the iOS firmware file; Modifying the kernel; Building a custom ramdisk; Booting the custom ramdisk; Establishing communication with the device; Bypassing the passcode; Imaging the data partition; Decrypting the data partition; Recovering the deleted data; Acquisition via jailbreaking; Summary; Chapter 4: Data Acquisition from iOS Backups; iTunes backup. |
ctrlnum | (OCoLC)888036062 |
dewey-full | 621.38456 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.38456 |
dewey-search | 621.38456 |
dewey-sort | 3621.38456 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07178cam a2200793 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn888036062</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">140820s2014 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">DEBBG</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">N$T</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICA</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">D6H</subfield><subfield code="d">OCL</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NLE</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">G3B</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018006612</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">884646805</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783288328</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783288329</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783288310</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783288311</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781783288311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)888036062</subfield><subfield code="z">(OCoLC)884646805</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000466</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">B903E018-D692-469B-BD23-56C28E2B4BDC</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.59</subfield><subfield code="b">.B666 2014</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">009070</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">621.38456</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bommisetty, Satish.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical mobile forensics :</subfield><subfield code="b">dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide /</subfield><subfield code="c">Satish Bommisetty, Rohit Tamma, Heather Mahalik.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Pub.,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed August 13, 2014).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Mobile Forensics; Mobile forensics; Mobile forensic challenges; Mobile phone evidence extraction process; The evidence intake phase; The identification phase; The legal authority; The goals of the examination; The make, model, and identifying information for the device; Removable and external data storage; Other sources of potential evidence; The preparation phase; The isolation phase; The processing phase; The verification phase.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Comparing extracted data to the handset dataUsing multiple tools and comparing the results; Using hash values; The document and reporting phase; The presentation phase; The archiving phase; Practical mobile forensic approaches; Mobile operating systems overview; Android; iOS; Windows phone; BlackBerry OS; Mobile forensic tool leveling system; Manual extraction; Logical extraction; Hex dump; Chip-off; Micro read; Data acquisition methods; Physical acquisition; Logical acquisition; Manual acquisition; Potential evidence stored on mobile phones; Rules of evidence; Admissible; Authentic; Complete.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">ReliableBelievable; Good forensic practices; Securing the evidence; Preserving the evidence; Documenting the evidence; Documenting all changes; Summary; Chapter 2: Understanding the Internals of iOS Devices; iPhone models; iPhone hardware; iPad models; iPad hardware; File system; The HFS Plus file system; The HFS Plus volume; Disk layout; iPhone operating system; iOS history; 1.x -- the first iPhone; 2.x -- App Store and 3G; 3.x -- the first iPad; 4.x -- Game Center and multitasking; 5.x -- Siri and iCloud; 6.x -- Apple Maps; 7.x -- the iPhone 5S and beyond; The iOS architecture.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Cocoa Touch layerThe Media layer; The Core Services layer; The Core OS layer; iOS security; Passcode; Code signing; Sandboxing; Encryption; Data protection; Address Space Layout Randomization; Privilege separation; Stack smashing protection; Data execution prevention; Data wipe; Activation Lock; App Store; Jailbreaking; Summary; Chapter 3: Data Acquisition from iOS Devices; Operating modes of iOS devices; Normal mode; Recovery mode; DFU mode; Physical acquisition; Acquisition via a custom ramdisk; The forensic environment setup; Downloading and installing the ldid tool.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Verifying the codesign_allocate tool pathInstalling OSXFuse; Installing Python modules; Downloading iPhone Data Protection Tools; Building the IMG3FS tool; Downloading redsn0w; Creating and loading the forensic toolkit; Downloading the iOS firmware file; Modifying the kernel; Building a custom ramdisk; Booting the custom ramdisk; Establishing communication with the device; Bypassing the passcode; Imaging the data partition; Decrypting the data partition; Recovering the deleted data; Acquisition via jailbreaking; Summary; Chapter 4: Data Acquisition from iOS Backups; iTunes backup.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is re.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Android (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2009043077</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">iOS (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2010039603</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Android (Electronic resource)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">IOS (Electronic resource)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Android (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">iOS (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">BlackBerry (Smartphone)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2002007882</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cell phone systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">BlackBerry (Téléphone intelligent)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Informatique mobile</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Téléphonie cellulaire</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Mechanical.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BlackBerry (Smartphone)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tamma, Rohit.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mahalik, Heather.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Practical Mobile Forensics (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCY7K8GK9JxmK8GtfxxFhH3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Bommisetty, Satish.</subfield><subfield code="t">Practical Mobile Forensics.</subfield><subfield code="d">Birmingham : Packt Publishing, ©2014</subfield><subfield code="z">9781783288311</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=816517</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26072545</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">816517</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">practicalmobilef0000bomm_e3f7</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11629331</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn888036062 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:09Z |
institution | BVB |
isbn | 9781783288328 1783288329 1783288310 9781783288311 |
language | English |
oclc_num | 888036062 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Pub., |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Bommisetty, Satish. Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / Satish Bommisetty, Rohit Tamma, Heather Mahalik. Birmingham, UK : Packt Pub., 2014. 1 online resource (1 volume) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier Community experience distilled Online resource; title from cover (Safari, viewed August 13, 2014). Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Mobile Forensics; Mobile forensics; Mobile forensic challenges; Mobile phone evidence extraction process; The evidence intake phase; The identification phase; The legal authority; The goals of the examination; The make, model, and identifying information for the device; Removable and external data storage; Other sources of potential evidence; The preparation phase; The isolation phase; The processing phase; The verification phase. Comparing extracted data to the handset dataUsing multiple tools and comparing the results; Using hash values; The document and reporting phase; The presentation phase; The archiving phase; Practical mobile forensic approaches; Mobile operating systems overview; Android; iOS; Windows phone; BlackBerry OS; Mobile forensic tool leveling system; Manual extraction; Logical extraction; Hex dump; Chip-off; Micro read; Data acquisition methods; Physical acquisition; Logical acquisition; Manual acquisition; Potential evidence stored on mobile phones; Rules of evidence; Admissible; Authentic; Complete. ReliableBelievable; Good forensic practices; Securing the evidence; Preserving the evidence; Documenting the evidence; Documenting all changes; Summary; Chapter 2: Understanding the Internals of iOS Devices; iPhone models; iPhone hardware; iPad models; iPad hardware; File system; The HFS Plus file system; The HFS Plus volume; Disk layout; iPhone operating system; iOS history; 1.x -- the first iPhone; 2.x -- App Store and 3G; 3.x -- the first iPad; 4.x -- Game Center and multitasking; 5.x -- Siri and iCloud; 6.x -- Apple Maps; 7.x -- the iPhone 5S and beyond; The iOS architecture. The Cocoa Touch layerThe Media layer; The Core Services layer; The Core OS layer; iOS security; Passcode; Code signing; Sandboxing; Encryption; Data protection; Address Space Layout Randomization; Privilege separation; Stack smashing protection; Data execution prevention; Data wipe; Activation Lock; App Store; Jailbreaking; Summary; Chapter 3: Data Acquisition from iOS Devices; Operating modes of iOS devices; Normal mode; Recovery mode; DFU mode; Physical acquisition; Acquisition via a custom ramdisk; The forensic environment setup; Downloading and installing the ldid tool. Verifying the codesign_allocate tool pathInstalling OSXFuse; Installing Python modules; Downloading iPhone Data Protection Tools; Building the IMG3FS tool; Downloading redsn0w; Creating and loading the forensic toolkit; Downloading the iOS firmware file; Modifying the kernel; Building a custom ramdisk; Booting the custom ramdisk; Establishing communication with the device; Bypassing the passcode; Imaging the data partition; Decrypting the data partition; Recovering the deleted data; Acquisition via jailbreaking; Summary; Chapter 4: Data Acquisition from iOS Backups; iTunes backup. The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is re. Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Microsoft Windows (Computer file) iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 Android (Electronic resource) blmlsh Microsoft Windows (Computer file) blmlsh IOS (Electronic resource) blmlsh Android (Electronic resource) fast iOS (Electronic resource) fast Microsoft Windows (Computer file) fast BlackBerry (Smartphone) http://id.loc.gov/authorities/subjects/sh2002007882 Mobile computing Security measures. Cell phone systems Security measures. BlackBerry (Téléphone intelligent) Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. TECHNOLOGY & ENGINEERING Mechanical. bisacsh BlackBerry (Smartphone) fast Tamma, Rohit. Mahalik, Heather. has work: Practical Mobile Forensics (Text) https://id.oclc.org/worldcat/entity/E39PCY7K8GK9JxmK8GtfxxFhH3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Bommisetty, Satish. Practical Mobile Forensics. Birmingham : Packt Publishing, ©2014 9781783288311 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=816517 Volltext |
spellingShingle | Bommisetty, Satish Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / Community experience distilled. Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Mobile Forensics; Mobile forensics; Mobile forensic challenges; Mobile phone evidence extraction process; The evidence intake phase; The identification phase; The legal authority; The goals of the examination; The make, model, and identifying information for the device; Removable and external data storage; Other sources of potential evidence; The preparation phase; The isolation phase; The processing phase; The verification phase. Comparing extracted data to the handset dataUsing multiple tools and comparing the results; Using hash values; The document and reporting phase; The presentation phase; The archiving phase; Practical mobile forensic approaches; Mobile operating systems overview; Android; iOS; Windows phone; BlackBerry OS; Mobile forensic tool leveling system; Manual extraction; Logical extraction; Hex dump; Chip-off; Micro read; Data acquisition methods; Physical acquisition; Logical acquisition; Manual acquisition; Potential evidence stored on mobile phones; Rules of evidence; Admissible; Authentic; Complete. ReliableBelievable; Good forensic practices; Securing the evidence; Preserving the evidence; Documenting the evidence; Documenting all changes; Summary; Chapter 2: Understanding the Internals of iOS Devices; iPhone models; iPhone hardware; iPad models; iPad hardware; File system; The HFS Plus file system; The HFS Plus volume; Disk layout; iPhone operating system; iOS history; 1.x -- the first iPhone; 2.x -- App Store and 3G; 3.x -- the first iPad; 4.x -- Game Center and multitasking; 5.x -- Siri and iCloud; 6.x -- Apple Maps; 7.x -- the iPhone 5S and beyond; The iOS architecture. The Cocoa Touch layerThe Media layer; The Core Services layer; The Core OS layer; iOS security; Passcode; Code signing; Sandboxing; Encryption; Data protection; Address Space Layout Randomization; Privilege separation; Stack smashing protection; Data execution prevention; Data wipe; Activation Lock; App Store; Jailbreaking; Summary; Chapter 3: Data Acquisition from iOS Devices; Operating modes of iOS devices; Normal mode; Recovery mode; DFU mode; Physical acquisition; Acquisition via a custom ramdisk; The forensic environment setup; Downloading and installing the ldid tool. Verifying the codesign_allocate tool pathInstalling OSXFuse; Installing Python modules; Downloading iPhone Data Protection Tools; Building the IMG3FS tool; Downloading redsn0w; Creating and loading the forensic toolkit; Downloading the iOS firmware file; Modifying the kernel; Building a custom ramdisk; Booting the custom ramdisk; Establishing communication with the device; Bypassing the passcode; Imaging the data partition; Decrypting the data partition; Recovering the deleted data; Acquisition via jailbreaking; Summary; Chapter 4: Data Acquisition from iOS Backups; iTunes backup. Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Microsoft Windows (Computer file) iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 Android (Electronic resource) blmlsh Microsoft Windows (Computer file) blmlsh IOS (Electronic resource) blmlsh Android (Electronic resource) fast iOS (Electronic resource) fast Microsoft Windows (Computer file) fast BlackBerry (Smartphone) http://id.loc.gov/authorities/subjects/sh2002007882 Mobile computing Security measures. Cell phone systems Security measures. BlackBerry (Téléphone intelligent) Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. TECHNOLOGY & ENGINEERING Mechanical. bisacsh BlackBerry (Smartphone) fast |
subject_GND | http://id.loc.gov/authorities/names/n2009043077 http://id.loc.gov/authorities/names/n2010039603 http://id.loc.gov/authorities/subjects/sh2002007882 |
title | Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / |
title_auth | Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / |
title_exact_search | Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / |
title_full | Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / Satish Bommisetty, Rohit Tamma, Heather Mahalik. |
title_fullStr | Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / Satish Bommisetty, Rohit Tamma, Heather Mahalik. |
title_full_unstemmed | Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / Satish Bommisetty, Rohit Tamma, Heather Mahalik. |
title_short | Practical mobile forensics : |
title_sort | practical mobile forensics dive into mobile forensics on ios android windows and blackberry devices with this action packed practical guide |
title_sub | dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide / |
topic | Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Microsoft Windows (Computer file) iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 Android (Electronic resource) blmlsh Microsoft Windows (Computer file) blmlsh IOS (Electronic resource) blmlsh Android (Electronic resource) fast iOS (Electronic resource) fast Microsoft Windows (Computer file) fast BlackBerry (Smartphone) http://id.loc.gov/authorities/subjects/sh2002007882 Mobile computing Security measures. Cell phone systems Security measures. BlackBerry (Téléphone intelligent) Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. TECHNOLOGY & ENGINEERING Mechanical. bisacsh BlackBerry (Smartphone) fast |
topic_facet | Android (Electronic resource) Microsoft Windows (Computer file) iOS (Electronic resource) IOS (Electronic resource) BlackBerry (Smartphone) Mobile computing Security measures. Cell phone systems Security measures. BlackBerry (Téléphone intelligent) Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. TECHNOLOGY & ENGINEERING Mechanical. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=816517 |
work_keys_str_mv | AT bommisettysatish practicalmobileforensicsdiveintomobileforensicsoniosandroidwindowsandblackberrydeviceswiththisactionpackedpracticalguide AT tammarohit practicalmobileforensicsdiveintomobileforensicsoniosandroidwindowsandblackberrydeviceswiththisactionpackedpracticalguide AT mahalikheather practicalmobileforensicsdiveintomobileforensicsoniosandroidwindowsandblackberrydeviceswiththisactionpackedpracticalguide |