We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. In this book, you’ll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. Investigating digital media is impossible without forensic tools.
0 Comments
Leave a Reply. |