Mastering mobile forensics : (Record no. 21072)

MARC details
000 -LEADER
fixed length control field 02143nam a2200217Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520103012.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781785287817
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA 76.59 .T34 2016
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Tahiri, Soufiane
Relator term author
245 #0 - TITLE STATEMENT
Title Mastering mobile forensics :
Remainder of title develop the capacity to dig deeper into mobile device data acquisition /
Statement of responsibility, etc. Soufiane Tahiri
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Birmingham, UK :
Name of publisher, distributor, etc. Packt Publishing, Limited,
Date of publication, distribution, etc. c2016
300 ## - PHYSICAL DESCRIPTION
Extent ix, 300 pages :
Other physical details illustrations ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Mobile Forensics and the Investigation Process Model -- Chapter 2: Do It Yourself - Low-Level Techniques -- Chapter 3: iDevices from a Forensic Point of View -- Chapter 4: Android Forensics -- Chapter 5: Windows Phone 8 Forensics -- Chapter 6: Mobile Forensics - Best Practices -- Preparing a Mobile Forensic Workstation -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. Mobile forensics presents a real challenge to the forensic community due to the fast and unstoppable changes in technology. This book aims to provide the forensic community an in-depth insight into mobile forensic techniques when it comes to deal with recent smartphones operating systems. Starting with a brief overview of forensic strategies and investigation procedures, you will understand the concepts of file carving, GPS analysis, and string analyzing. You will also see the difference between encryption, encoding, and hashing methods and get to grips with the fundamentals of reverse code engineering. Next, the book will walk you through the iOS, Android and Windows Phone architectures and filesystem, followed by showing you various forensic approaches and data gathering techniques. You will also explore advanced forensic techniques and find out how to deal with third-applications using case studies. The book will help you master data acquisition on Windows Phone 8. By the end of this book, you will be acquainted with best practices and the different models used in mobile forensics.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element MOBILE COMMUNICATION SYSTEMS -- SECURITY MEASURES
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Gen. Ed. - CCIT LRC - Main National University - Manila General Circulation 01/12/2023 Donation   GC QA 76.59 .T34 2016 c.2 NULIB000018831 05/20/2025 c.2 05/20/2025 Books