Books > Social sciences > Sociology, social studies > Crime & criminology > Criminal investigation & detection
|
Buy Now
Android Forensics - Investigation, Analysis and Mobile Security for Google Android (Paperback, New)
Loot Price: R1,454
Discovery Miles 14 540
|
|
Android Forensics - Investigation, Analysis and Mobile Security for Google Android (Paperback, New)
Expected to ship within 12 - 17 working days
|
Android Forensics: Investigation, Analysis, and Mobile Security for
Google Android provides the background, techniques and analysis
tools you need to effectively investigate an Android phone. This
book offers a thorough review of the Android platform, including
the core hardware and software components, file systems and data
structures, data security considerations, and forensic acquisition
techniques and strategies for the subsequent analysis require d.
this book is ideal for the classroom as it teaches readers not only
how to forensically acquire Android devices but also how to apply
actual forensic techniques to recover data. The book lays a heavy
emphasis on open source tools and step-by-step examples and
includes information about Android applications needed for forensic
investigations. It is organized into seven chapters that cover the
history of the Android platform and its internationalization; the
Android Open Source Project (AOSP) and the Android Market; a brief
tutorial on Linux and Android forensics; and how to create an
Ubuntu-based virtual machine (VM). The book also considers a wide
array of Android-supported hardware and device types, the various
Android releases, the Android software development kit (SDK), the
Davlik VM, key components of Android security, and other
fundamental concepts related to Android forensics, such as the
Android debug bridge and the USB debugging setting. In addition, it
analyzes how data are stored on an Android device and describes
strategies and specific utilities that a forensic analyst or
security engineer can use to examine an acquired Android device.
Core Android developers and manufacturers, app developers,
corporate security officers, and anyone with limited forensic
experience will find this book extremely useful. It will also
appeal to computer forensic and incident response professionals,
including commercial/private sector contractors, consultants, and
those in federal government.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.