Hoog | Android Forensics | E-Book | sack.de
E-Book

E-Book, Englisch, 432 Seiten, Format (B × H): 191 mm x 235 mm

Hoog Android Forensics

Investigation, Analysis and Mobile Security for Google Android
1. Auflage 2011
ISBN: 978-1-59749-652-0
Verlag: Academic Press
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Investigation, Analysis and Mobile Security for Google Android

E-Book, Englisch, 432 Seiten, Format (B × H): 191 mm x 235 mm

ISBN: 978-1-59749-652-0
Verlag: Academic Press
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Android Forensics: Investigation, Analysis, and Mobile Security for Google Android examines the Android mobile platform and shares techniques for the forensic acquisition and subsequent analysis of Android devices. Organized into seven chapters, the book looks at the history of the Android platform and its internationalization; it discusses the Android Open Source Project (AOSP) and the Android Market; it offers a brief tutorial on Linux and Android forensics; and it explains how to create an Ubuntu-based virtual machine (VM).

The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to analyze an acquired Android device.

Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful.

- Named a 2011 Best Digital Forensics Book by InfoSec Reviews

- Ability to forensically acquire Android devices using the techniques outlined in the book

- Detailed information about Android applications needed for forensics investigations

- Important information about SQLite, a file based structured data storage relevant for both Android and many other platforms.

Hoog Android Forensics jetzt bestellen!

Zielgruppe


<p>Computer forensic and incident response professionals. This includes LE, federal government, commercial/private sector contractors, consultants, etc.</p>


Autoren/Hrsg.


Weitere Infos & Material


Chapter 1. Android and Mobile Forensics Chapter 2. Android Hardware Platforms Chapter 3. Android Software Development Kit and Android Debug Bridge Chapter 4. Android File Systems and Data Structures Chapter 5. Android Device, Data and App Security Chapter 6. Android Forensic Techniques Chapter 7. Android Application and Forensic Analysis


Hoog, Andrew
Andrew Hoog is a computer scientist, certified forensic analyst (GCFA and CCE), computer and mobile forensics researcher, former adjunct professor (assembly language) and owner of viaForensics, an innovative computer and mobile forensic firm. He divides his energies between investigations, research and training about the computer and mobile forensic discipline. He writes computer/mobile forensic how-to guides, is interviewed on radio programs and lectures and trains both corporations and law enforcement agencies. As the foremost expert in Android Forensics, he leads expert level training courses, speaks frequently at conferences and is writing a book on Android forensics.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.