Practical mobile forensics :: forensically investigate and analyze iOS, Android, and Windows 10 devices /
Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10.
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2020.
|
Ausgabe: | Fourth edition. |
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10. |
Beschreibung: | 1 online resource |
ISBN: | 1838644423 9781838644420 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1152255852 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | | ||
007 | cr ||||||||||| | ||
008 | 200409s2020 enk o 000 0 eng d | ||
040 | |a UKAHL |b eng |c UKAHL |d N$T |d OCLCF |d YDX |d EBLCP |d YDXIT |d UKMGB |d OCLCO |d LVT |d TSC |d OCLCO |d OCLCQ |d LDS |d UMI |d NLW |d DST |d OCLCL |d TMA |d OCLCQ |d OCLCO | ||
015 | |a GBC070732 |2 bnb | ||
016 | 7 | |a 019783611 |2 Uk | |
019 | |a 1150450425 |a 1151196589 |a 1194204387 |a 1302285200 |a 1304997403 | ||
020 | |a 1838644423 | ||
020 | |a 9781838644420 |q (electronic book) | ||
020 | |z 9781838647520 | ||
035 | |a (OCoLC)1152255852 |z (OCoLC)1150450425 |z (OCoLC)1151196589 |z (OCoLC)1194204387 |z (OCoLC)1302285200 |z (OCoLC)1304997403 | ||
037 | |a 9781838644420 |b Packt Publishing | ||
050 | 4 | |a QA76.59 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Tamma, Rohit, |e author. | |
245 | 1 | 0 | |a Practical mobile forensics : |b forensically investigate and analyze iOS, Android, and Windows 10 devices / |c Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. |
250 | |a Fourth edition. | ||
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2020. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
336 | |a still image |b sti |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Community experience distilled | |
505 | 0 | |a Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 01: Introduction to Mobile Forensics -- The need for mobile forensics -- Understanding mobile forensics -- Challenges in mobile forensics -- The mobile phone evidence extraction process -- The evidence intake phase -- The identification phase -- The legal authority -- Data that needs to be extracted -- The make, model, and identifying information for the device -- Data storage media -- Other sources of potential evidence -- The preparation phase -- The isolation phase | |
505 | 8 | |a The processing phase -- The verification phase -- The documenting and reporting phase -- The archiving phase -- Practical mobile forensic approaches -- Understanding mobile operating systems -- Android -- iOS -- Windows Phone -- Mobile forensic tool leveling system -- Manual extraction -- Logical analysis -- Hex dump -- Chip-off -- Micro read -- Data acquisition methods -- Physical acquisition -- Logical acquisition -- Manual acquisition -- Potential evidence stored on mobile phones -- Examination and analysis -- Rules of evidence -- Good forensic practices -- Securing the evidence | |
505 | 8 | |a Preserving the evidence -- Documenting the evidence and changes -- Reporting -- Summary -- Section 1: iOS Forensics -- Chapter 02: Understanding the Internals of iOS Devices -- iPhone models and hardware -- Identifying the correct hardware model -- Understanding the iPhone hardware -- iPad models and hardware -- Understanding the iPad hardware -- The HFS Plus and APFS filesystems -- The HFS Plus filesystem -- The HFS Plus volume -- The APFS filesystem -- The APFS structure -- Disk layout -- The iPhone OS -- The iOS architecture -- iOS security -- Passcodes, Touch ID, and Face ID -- Code signing | |
505 | 8 | |a Sandboxing -- Encryption -- Data protection -- Address Space Layout Randomization (ASLR) -- Privilege separation -- Stack-smashing protection -- Data Execution Prevention (DEP) -- Data wiping -- Activation Lock -- The App Store -- Jailbreaking -- Summary -- Chapter 03: Data Acquisition from iOS Devices -- Operating modes of iOS devices -- Normal mode -- Recovery mode -- DFU mode -- Setting up the forensic environment -- Password protection and potential bypasses -- Logical acquisition -- Practical logical acquisition with libimobiledevice | |
505 | 8 | |a Practical logical acquisition with the Belkasoft Acquisition Tool -- Practical logical acquisition with Magnet ACQUIRE -- Filesystem acquisition -- Practical jailbreaking -- Practical filesystem acquisition with free tools -- Practical filesystem acquisition with Elcomsoft iOS Forensic Toolkit -- Summary -- Chapter 04: Data Acquisition from iOS Backups -- Working with iTunes backups -- Creating and analyzing backups with iTunes -- Understanding the backup structure -- info.plist -- manifest.plist -- status.plist -- manifest.db -- Extracting unencrypted backups -- iBackup Viewer -- iExplorer | |
520 | |a Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10. | ||
630 | 0 | 0 | |a Android (Electronic resource) |0 http://id.loc.gov/authorities/names/n2009043077 |
630 | 0 | 0 | |a Windows phone (Computer file) |0 http://id.loc.gov/authorities/names/n2010077421 |
630 | 0 | 0 | |a Microsoft Windows (Computer file) |0 http://id.loc.gov/authorities/names/n88027331 |
630 | 0 | 0 | |a iOS (Electronic resource) |0 http://id.loc.gov/authorities/names/n2010039603 |
630 | 0 | 7 | |a Android (Electronic resource) |2 fast |
630 | 0 | 7 | |a iOS (Electronic resource) |2 fast |
630 | 0 | 7 | |a Microsoft Windows (Computer file) |2 fast |
630 | 0 | 7 | |a Windows phone (Computer file) |2 fast |
650 | 0 | |a Mobile computing |x Security measures. | |
650 | 0 | |a Cell phone systems |x Security measures. | |
650 | 0 | |a Computer crimes |x Investigation. |0 http://id.loc.gov/authorities/subjects/sh85029493 | |
650 | 6 | |a Informatique mobile |x Sécurité |x Mesures. | |
650 | 6 | |a Téléphonie cellulaire |x Sécurité |x Mesures. | |
650 | 6 | |a Criminalité informatique |x Enquêtes. | |
650 | 7 | |a Computer crimes |x Investigation |2 fast | |
700 | 1 | |a Skulkin, Oleg, |e author. | |
700 | 1 | |a Mahalik, Heather, |e author. | |
700 | 1 | |a Bommisetty, Satish, |e author. | |
758 | |i has work: |a Practical mobile forensics (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFFdfJrrb9JwYQpFvMRgw3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Tamma, Rohit |t Practical Mobile Forensics : Forensically Investigate and Analyze IOS, Android, and Windows 10 Devices, 4th Edition |d Birmingham : Packt Publishing, Limited,c2020 |
830 | 0 | |a Community experience distilled. | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2435134 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH37351406 | ||
938 | |a EBSCOhost |b EBSC |n 2435134 | ||
938 | |a YBP Library Services |b YANK |n 301213162 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6173606 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1152255852 |
---|---|
_version_ | 1816882516328448001 |
adam_text | |
any_adam_object | |
author | Tamma, Rohit Skulkin, Oleg Mahalik, Heather Bommisetty, Satish |
author_facet | Tamma, Rohit Skulkin, Oleg Mahalik, Heather Bommisetty, Satish |
author_role | aut aut aut aut |
author_sort | Tamma, Rohit |
author_variant | r t rt o s os h m hm s b sb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.59 |
callnumber-search | QA76.59 |
callnumber-sort | QA 276.59 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 01: Introduction to Mobile Forensics -- The need for mobile forensics -- Understanding mobile forensics -- Challenges in mobile forensics -- The mobile phone evidence extraction process -- The evidence intake phase -- The identification phase -- The legal authority -- Data that needs to be extracted -- The make, model, and identifying information for the device -- Data storage media -- Other sources of potential evidence -- The preparation phase -- The isolation phase The processing phase -- The verification phase -- The documenting and reporting phase -- The archiving phase -- Practical mobile forensic approaches -- Understanding mobile operating systems -- Android -- iOS -- Windows Phone -- Mobile forensic tool leveling system -- Manual extraction -- Logical analysis -- Hex dump -- Chip-off -- Micro read -- Data acquisition methods -- Physical acquisition -- Logical acquisition -- Manual acquisition -- Potential evidence stored on mobile phones -- Examination and analysis -- Rules of evidence -- Good forensic practices -- Securing the evidence Preserving the evidence -- Documenting the evidence and changes -- Reporting -- Summary -- Section 1: iOS Forensics -- Chapter 02: Understanding the Internals of iOS Devices -- iPhone models and hardware -- Identifying the correct hardware model -- Understanding the iPhone hardware -- iPad models and hardware -- Understanding the iPad hardware -- The HFS Plus and APFS filesystems -- The HFS Plus filesystem -- The HFS Plus volume -- The APFS filesystem -- The APFS structure -- Disk layout -- The iPhone OS -- The iOS architecture -- iOS security -- Passcodes, Touch ID, and Face ID -- Code signing Sandboxing -- Encryption -- Data protection -- Address Space Layout Randomization (ASLR) -- Privilege separation -- Stack-smashing protection -- Data Execution Prevention (DEP) -- Data wiping -- Activation Lock -- The App Store -- Jailbreaking -- Summary -- Chapter 03: Data Acquisition from iOS Devices -- Operating modes of iOS devices -- Normal mode -- Recovery mode -- DFU mode -- Setting up the forensic environment -- Password protection and potential bypasses -- Logical acquisition -- Practical logical acquisition with libimobiledevice Practical logical acquisition with the Belkasoft Acquisition Tool -- Practical logical acquisition with Magnet ACQUIRE -- Filesystem acquisition -- Practical jailbreaking -- Practical filesystem acquisition with free tools -- Practical filesystem acquisition with Elcomsoft iOS Forensic Toolkit -- Summary -- Chapter 04: Data Acquisition from iOS Backups -- Working with iTunes backups -- Creating and analyzing backups with iTunes -- Understanding the backup structure -- info.plist -- manifest.plist -- status.plist -- manifest.db -- Extracting unencrypted backups -- iBackup Viewer -- iExplorer |
ctrlnum | (OCoLC)1152255852 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Fourth edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06626cam a2200757 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1152255852</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">200409s2020 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UKAHL</subfield><subfield code="b">eng</subfield><subfield code="c">UKAHL</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDX</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDXIT</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LVT</subfield><subfield code="d">TSC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LDS</subfield><subfield code="d">UMI</subfield><subfield code="d">NLW</subfield><subfield code="d">DST</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC070732</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019783611</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1150450425</subfield><subfield code="a">1151196589</subfield><subfield code="a">1194204387</subfield><subfield code="a">1302285200</subfield><subfield code="a">1304997403</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838644423</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838644420</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838647520</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1152255852</subfield><subfield code="z">(OCoLC)1150450425</subfield><subfield code="z">(OCoLC)1151196589</subfield><subfield code="z">(OCoLC)1194204387</subfield><subfield code="z">(OCoLC)1302285200</subfield><subfield code="z">(OCoLC)1304997403</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781838644420</subfield><subfield code="b">Packt Publishing</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.59</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tamma, Rohit,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical mobile forensics :</subfield><subfield code="b">forensically investigate and analyze iOS, Android, and Windows 10 devices /</subfield><subfield code="c">Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">still image</subfield><subfield code="b">sti</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 01: Introduction to Mobile Forensics -- The need for mobile forensics -- Understanding mobile forensics -- Challenges in mobile forensics -- The mobile phone evidence extraction process -- The evidence intake phase -- The identification phase -- The legal authority -- Data that needs to be extracted -- The make, model, and identifying information for the device -- Data storage media -- Other sources of potential evidence -- The preparation phase -- The isolation phase</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The processing phase -- The verification phase -- The documenting and reporting phase -- The archiving phase -- Practical mobile forensic approaches -- Understanding mobile operating systems -- Android -- iOS -- Windows Phone -- Mobile forensic tool leveling system -- Manual extraction -- Logical analysis -- Hex dump -- Chip-off -- Micro read -- Data acquisition methods -- Physical acquisition -- Logical acquisition -- Manual acquisition -- Potential evidence stored on mobile phones -- Examination and analysis -- Rules of evidence -- Good forensic practices -- Securing the evidence</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Preserving the evidence -- Documenting the evidence and changes -- Reporting -- Summary -- Section 1: iOS Forensics -- Chapter 02: Understanding the Internals of iOS Devices -- iPhone models and hardware -- Identifying the correct hardware model -- Understanding the iPhone hardware -- iPad models and hardware -- Understanding the iPad hardware -- The HFS Plus and APFS filesystems -- The HFS Plus filesystem -- The HFS Plus volume -- The APFS filesystem -- The APFS structure -- Disk layout -- The iPhone OS -- The iOS architecture -- iOS security -- Passcodes, Touch ID, and Face ID -- Code signing</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Sandboxing -- Encryption -- Data protection -- Address Space Layout Randomization (ASLR) -- Privilege separation -- Stack-smashing protection -- Data Execution Prevention (DEP) -- Data wiping -- Activation Lock -- The App Store -- Jailbreaking -- Summary -- Chapter 03: Data Acquisition from iOS Devices -- Operating modes of iOS devices -- Normal mode -- Recovery mode -- DFU mode -- Setting up the forensic environment -- Password protection and potential bypasses -- Logical acquisition -- Practical logical acquisition with libimobiledevice</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Practical logical acquisition with the Belkasoft Acquisition Tool -- Practical logical acquisition with Magnet ACQUIRE -- Filesystem acquisition -- Practical jailbreaking -- Practical filesystem acquisition with free tools -- Practical filesystem acquisition with Elcomsoft iOS Forensic Toolkit -- Summary -- Chapter 04: Data Acquisition from iOS Backups -- Working with iTunes backups -- Creating and analyzing backups with iTunes -- Understanding the backup structure -- info.plist -- manifest.plist -- status.plist -- manifest.db -- Extracting unencrypted backups -- iBackup Viewer -- iExplorer</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Android (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2009043077</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Windows phone (Computer file)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2010077421</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n88027331</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">iOS (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2010039603</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Android (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">iOS (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Windows phone (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cell phone systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029493</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Informatique mobile</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Téléphonie cellulaire</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique</subfield><subfield code="x">Enquêtes.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skulkin, Oleg,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mahalik, Heather,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bommisetty, Satish,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Practical mobile forensics (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFFdfJrrb9JwYQpFvMRgw3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Tamma, Rohit</subfield><subfield code="t">Practical Mobile Forensics : Forensically Investigate and Analyze IOS, Android, and Windows 10 Devices, 4th Edition</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2020</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2435134</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37351406</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2435134</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301213162</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6173606</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1152255852 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:51Z |
institution | BVB |
isbn | 1838644423 9781838644420 |
language | English |
oclc_num | 1152255852 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Tamma, Rohit, author. Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. Fourth edition. Birmingham, UK : Packt Publishing, 2020. 1 online resource text txt rdacontent still image sti rdacontent computer c rdamedia online resource cr rdacarrier Community experience distilled Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 01: Introduction to Mobile Forensics -- The need for mobile forensics -- Understanding mobile forensics -- Challenges in mobile forensics -- The mobile phone evidence extraction process -- The evidence intake phase -- The identification phase -- The legal authority -- Data that needs to be extracted -- The make, model, and identifying information for the device -- Data storage media -- Other sources of potential evidence -- The preparation phase -- The isolation phase The processing phase -- The verification phase -- The documenting and reporting phase -- The archiving phase -- Practical mobile forensic approaches -- Understanding mobile operating systems -- Android -- iOS -- Windows Phone -- Mobile forensic tool leveling system -- Manual extraction -- Logical analysis -- Hex dump -- Chip-off -- Micro read -- Data acquisition methods -- Physical acquisition -- Logical acquisition -- Manual acquisition -- Potential evidence stored on mobile phones -- Examination and analysis -- Rules of evidence -- Good forensic practices -- Securing the evidence Preserving the evidence -- Documenting the evidence and changes -- Reporting -- Summary -- Section 1: iOS Forensics -- Chapter 02: Understanding the Internals of iOS Devices -- iPhone models and hardware -- Identifying the correct hardware model -- Understanding the iPhone hardware -- iPad models and hardware -- Understanding the iPad hardware -- The HFS Plus and APFS filesystems -- The HFS Plus filesystem -- The HFS Plus volume -- The APFS filesystem -- The APFS structure -- Disk layout -- The iPhone OS -- The iOS architecture -- iOS security -- Passcodes, Touch ID, and Face ID -- Code signing Sandboxing -- Encryption -- Data protection -- Address Space Layout Randomization (ASLR) -- Privilege separation -- Stack-smashing protection -- Data Execution Prevention (DEP) -- Data wiping -- Activation Lock -- The App Store -- Jailbreaking -- Summary -- Chapter 03: Data Acquisition from iOS Devices -- Operating modes of iOS devices -- Normal mode -- Recovery mode -- DFU mode -- Setting up the forensic environment -- Password protection and potential bypasses -- Logical acquisition -- Practical logical acquisition with libimobiledevice Practical logical acquisition with the Belkasoft Acquisition Tool -- Practical logical acquisition with Magnet ACQUIRE -- Filesystem acquisition -- Practical jailbreaking -- Practical filesystem acquisition with free tools -- Practical filesystem acquisition with Elcomsoft iOS Forensic Toolkit -- Summary -- Chapter 04: Data Acquisition from iOS Backups -- Working with iTunes backups -- Creating and analyzing backups with iTunes -- Understanding the backup structure -- info.plist -- manifest.plist -- status.plist -- manifest.db -- Extracting unencrypted backups -- iBackup Viewer -- iExplorer Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10. Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Windows phone (Computer file) http://id.loc.gov/authorities/names/n2010077421 Microsoft Windows (Computer file) http://id.loc.gov/authorities/names/n88027331 iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 Android (Electronic resource) fast iOS (Electronic resource) fast Microsoft Windows (Computer file) fast Windows phone (Computer file) fast Mobile computing Security measures. Cell phone systems Security measures. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Criminalité informatique Enquêtes. Computer crimes Investigation fast Skulkin, Oleg, author. Mahalik, Heather, author. Bommisetty, Satish, author. has work: Practical mobile forensics (Text) https://id.oclc.org/worldcat/entity/E39PCFFdfJrrb9JwYQpFvMRgw3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Tamma, Rohit Practical Mobile Forensics : Forensically Investigate and Analyze IOS, Android, and Windows 10 Devices, 4th Edition Birmingham : Packt Publishing, Limited,c2020 Community experience distilled. FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2435134 Volltext |
spellingShingle | Tamma, Rohit Skulkin, Oleg Mahalik, Heather Bommisetty, Satish Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / Community experience distilled. Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 01: Introduction to Mobile Forensics -- The need for mobile forensics -- Understanding mobile forensics -- Challenges in mobile forensics -- The mobile phone evidence extraction process -- The evidence intake phase -- The identification phase -- The legal authority -- Data that needs to be extracted -- The make, model, and identifying information for the device -- Data storage media -- Other sources of potential evidence -- The preparation phase -- The isolation phase The processing phase -- The verification phase -- The documenting and reporting phase -- The archiving phase -- Practical mobile forensic approaches -- Understanding mobile operating systems -- Android -- iOS -- Windows Phone -- Mobile forensic tool leveling system -- Manual extraction -- Logical analysis -- Hex dump -- Chip-off -- Micro read -- Data acquisition methods -- Physical acquisition -- Logical acquisition -- Manual acquisition -- Potential evidence stored on mobile phones -- Examination and analysis -- Rules of evidence -- Good forensic practices -- Securing the evidence Preserving the evidence -- Documenting the evidence and changes -- Reporting -- Summary -- Section 1: iOS Forensics -- Chapter 02: Understanding the Internals of iOS Devices -- iPhone models and hardware -- Identifying the correct hardware model -- Understanding the iPhone hardware -- iPad models and hardware -- Understanding the iPad hardware -- The HFS Plus and APFS filesystems -- The HFS Plus filesystem -- The HFS Plus volume -- The APFS filesystem -- The APFS structure -- Disk layout -- The iPhone OS -- The iOS architecture -- iOS security -- Passcodes, Touch ID, and Face ID -- Code signing Sandboxing -- Encryption -- Data protection -- Address Space Layout Randomization (ASLR) -- Privilege separation -- Stack-smashing protection -- Data Execution Prevention (DEP) -- Data wiping -- Activation Lock -- The App Store -- Jailbreaking -- Summary -- Chapter 03: Data Acquisition from iOS Devices -- Operating modes of iOS devices -- Normal mode -- Recovery mode -- DFU mode -- Setting up the forensic environment -- Password protection and potential bypasses -- Logical acquisition -- Practical logical acquisition with libimobiledevice Practical logical acquisition with the Belkasoft Acquisition Tool -- Practical logical acquisition with Magnet ACQUIRE -- Filesystem acquisition -- Practical jailbreaking -- Practical filesystem acquisition with free tools -- Practical filesystem acquisition with Elcomsoft iOS Forensic Toolkit -- Summary -- Chapter 04: Data Acquisition from iOS Backups -- Working with iTunes backups -- Creating and analyzing backups with iTunes -- Understanding the backup structure -- info.plist -- manifest.plist -- status.plist -- manifest.db -- Extracting unencrypted backups -- iBackup Viewer -- iExplorer Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Windows phone (Computer file) http://id.loc.gov/authorities/names/n2010077421 Microsoft Windows (Computer file) http://id.loc.gov/authorities/names/n88027331 iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 Android (Electronic resource) fast iOS (Electronic resource) fast Microsoft Windows (Computer file) fast Windows phone (Computer file) fast Mobile computing Security measures. Cell phone systems Security measures. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Criminalité informatique Enquêtes. Computer crimes Investigation fast |
subject_GND | http://id.loc.gov/authorities/names/n2009043077 http://id.loc.gov/authorities/names/n2010077421 http://id.loc.gov/authorities/names/n88027331 http://id.loc.gov/authorities/names/n2010039603 http://id.loc.gov/authorities/subjects/sh85029493 |
title | Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / |
title_auth | Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / |
title_exact_search | Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / |
title_full | Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. |
title_fullStr | Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. |
title_full_unstemmed | Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices / Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. |
title_short | Practical mobile forensics : |
title_sort | practical mobile forensics forensically investigate and analyze ios android and windows 10 devices |
title_sub | forensically investigate and analyze iOS, Android, and Windows 10 devices / |
topic | Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Windows phone (Computer file) http://id.loc.gov/authorities/names/n2010077421 Microsoft Windows (Computer file) http://id.loc.gov/authorities/names/n88027331 iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 Android (Electronic resource) fast iOS (Electronic resource) fast Microsoft Windows (Computer file) fast Windows phone (Computer file) fast Mobile computing Security measures. Cell phone systems Security measures. Computer crimes Investigation. http://id.loc.gov/authorities/subjects/sh85029493 Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Criminalité informatique Enquêtes. Computer crimes Investigation fast |
topic_facet | Android (Electronic resource) Windows phone (Computer file) Microsoft Windows (Computer file) iOS (Electronic resource) Mobile computing Security measures. Cell phone systems Security measures. Computer crimes Investigation. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Criminalité informatique Enquêtes. Computer crimes Investigation |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2435134 |
work_keys_str_mv | AT tammarohit practicalmobileforensicsforensicallyinvestigateandanalyzeiosandroidandwindows10devices AT skulkinoleg practicalmobileforensicsforensicallyinvestigateandanalyzeiosandroidandwindows10devices AT mahalikheather practicalmobileforensicsforensicallyinvestigateandanalyzeiosandroidandwindows10devices AT bommisettysatish practicalmobileforensicsforensicallyinvestigateandanalyzeiosandroidandwindows10devices |