MARC details
000 -LEADER |
fixed length control field |
02143nam a2200217Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520103012.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781785287817 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.59 .T34 2016 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Tahiri, Soufiane |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Mastering mobile forensics : |
Remainder of title |
develop the capacity to dig deeper into mobile device data acquisition / |
Statement of responsibility, etc. |
Soufiane Tahiri |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Birmingham, UK : |
Name of publisher, distributor, etc. |
Packt Publishing, Limited, |
Date of publication, distribution, etc. |
c2016 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
ix, 300 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1: Mobile Forensics and the Investigation Process Model -- Chapter 2: Do It Yourself - Low-Level Techniques -- Chapter 3: iDevices from a Forensic Point of View -- Chapter 4: Android Forensics -- Chapter 5: Windows Phone 8 Forensics -- Chapter 6: Mobile Forensics - Best Practices -- Preparing a Mobile Forensic Workstation -- Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Mobile forensics presents a real challenge to the forensic community due to the fast and unstoppable changes in technology. This book aims to provide the forensic community an in-depth insight into mobile forensic techniques when it comes to deal with recent smartphones operating systems. Starting with a brief overview of forensic strategies and investigation procedures, you will understand the concepts of file carving, GPS analysis, and string analyzing. You will also see the difference between encryption, encoding, and hashing methods and get to grips with the fundamentals of reverse code engineering. Next, the book will walk you through the iOS, Android and Windows Phone architectures and filesystem, followed by showing you various forensic approaches and data gathering techniques. You will also explore advanced forensic techniques and find out how to deal with third-applications using case studies. The book will help you master data acquisition on Windows Phone 8. By the end of this book, you will be acquainted with best practices and the different models used in mobile forensics. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
MOBILE COMMUNICATION SYSTEMS -- SECURITY MEASURES |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |