|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBSCO_on1082187226 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
190112s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d YDX
|d N$T
|d OCLCF
|d OCLCQ
|d NLW
|d OCLCO
|d K6U
|d OCLCQ
|
019 |
|
|
|a 1081387831
|a 1099524799
|
020 |
|
|
|a 9781789137491
|
020 |
|
|
|a 1789137497
|
020 |
|
|
|z 1789131014
|
020 |
|
|
|z 9781789131017
|
035 |
|
|
|a (OCoLC)1082187226
|z (OCoLC)1081387831
|z (OCoLC)1099524799
|
050 |
|
4 |
|a QA76.774.A53
|
072 |
|
7 |
|a COM
|x 046100
|2 bisacsh
|
082 |
0 |
4 |
|a 005.432
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Skulkin, Oleg.
|
245 |
1 |
0 |
|a Learning Android Forensics :
|b Analyze Android Devices with the Latest Forensic Tools and Techniques, 2nd Edition.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2018.
|
300 |
|
|
|a 1 online resource (324 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Introducing Android Forensics; Mobile forensics; The mobile forensics approach; Investigation preparation; Seizure and isolation; The acquisition phase; Examination and analysis; Reporting; Challenges in mobile forensics; Android architecture; The Linux kernel; Hardware abstraction level; Android Runtime; Native C/C++ Libraries; Java API Framework; The application layer; Android security; Security at OS level through the Linux kernel; Permission model; Sample permission model in Android
|
505 |
8 |
|
|a Application sandboxingSELinux in Android; Application signing; Secure inter-process communication; Binder communication model; Android hardware components; Core components; Central Processing Unit (CPU); Baseband processor; Memory; SD Card; Display; Battery; Android boot process; Boot ROM code execution; The bootloader; The Linux kernel; The init process; Zygote and Dalvik; System server; Summary; Chapter 2: Setting up the Android Forensic Environment; Android forensic setup; Android SDK; Installing the Android SDK; Android Virtual Device
|
505 |
8 |
|
|a Connecting and accessing Android devices from the workstationIdentifying the correct device cable; Installing device drivers; Accessing the device; Android Debug Bridge; Using ADB to access the device; Detecting a connected device; Directing commands to a specific device; Issuing shell commands; Basic Linux commands; Installing an application; Pulling data from the device; Pushing data to the device; Restarting the ADB server; Viewing log data; Rooting Android; What is rooting?; Why root?; Recovery and fastboot; Recovery mode; Accessing recovery mode; Custom recovery; Fastboot mode
|
505 |
8 |
|
|a Locked and unlocked boot loadersHow to root; Rooting an unlocked boot loader; Rooting a locked boot loader; ADB on a rooted device; Summary; Chapter 3: Understanding Data Storage on Android Devices; Android partition layout; Common partitions in Android; Identifying partition layout; Android file hierarchy; Overview of directories; The acct directory; The cache directory; The config directory; The data directory; The dev directory; The mnt directory; The proc directory; The sbin directory; The storage directory; The system directory; Application data storage on the device; Shared preferences
|
505 |
8 |
|
|a Internal storageExternal storage; SQLite database; Network; Android filesystem overview; Viewing filesystems on an Android device; Common Android filesystems; Flash memory filesystems; Media-based filesystems; Pseudo filesystems; Summary; Chapter 4: Extracting Data Logically from Android Devices; Logical extraction overview; What data can be recovered logically?; Root access; Manual ADB data extraction; USB Debugging; Using adb shell to determine if a device is rooted; adb pull; Recovery Mode; Fastboot mode; Determining bootloader status; Booting to a custom recovery image
|
500 |
|
|
|a ADB backup extractions
|
520 |
|
|
|a This book will introduce you to Android forensics helping you to set up a forensic environment, handle mobile evidence, analyze how and where common applications store their data. You will also learn to identify malware on a device, and how to analyze it.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Android (Electronic resource)
|
630 |
0 |
7 |
|a Android (Electronic resource)
|2 fast
|0 (OCoLC)fst01776064
|
650 |
|
0 |
|a Mobile computing.
|
650 |
|
0 |
|a Data recovery (Computer science)
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
6 |
|a Informatique mobile.
|
650 |
|
6 |
|a Récupération des données (Informatique)
|
650 |
|
6 |
|a Criminalité informatique
|x Enquêtes.
|
650 |
|
7 |
|a Mobile & handheld device programming / Apps programming.
|2 bicssc
|
650 |
|
7 |
|a Computer viruses, Trojans & worms.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x Android.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Investigation.
|2 fast
|0 (OCoLC)fst00872065
|
650 |
|
7 |
|a Data recovery (Computer science)
|2 fast
|0 (OCoLC)fst00887974
|
650 |
|
7 |
|a Mobile computing.
|2 fast
|0 (OCoLC)fst01024221
|
700 |
1 |
|
|a Tindall, Donnie.
|
700 |
1 |
|
|a Tamma, Rohit.
|
776 |
0 |
8 |
|i Print version:
|a Skulkin, Oleg.
|t Learning Android Forensics : Analyze Android Devices with the Latest Forensic Tools and Techniques, 2nd Edition.
|d Birmingham : Packt Publishing Ltd, ©2018
|z 9781789131017
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1992253
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5627920
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1992253
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15962537
|
994 |
|
|
|a 92
|b IZTAP
|