• Complain

Andrew Hoog - Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Here you can read online Andrew Hoog - Android Forensics: Investigation, Analysis and Mobile Security for Google Android full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Birmingham, year: 2012, publisher: Packt Publishing, Limited, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Android Forensics: Investigation, Analysis and Mobile Security for Google Android
  • Author:
  • Publisher:
    Packt Publishing, Limited
  • Genre:
  • Year:
    2012
  • City:
    Birmingham
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Android Forensics: Investigation, Analysis and Mobile Security for Google Android: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Android Forensics: Investigation, Analysis and Mobile Security for Google Android" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Android Forensics: Investigation, Analysis, and Mobile Security for Google Android examines the Android mobile platform and shares techniques for the forensic acquisition and subsequent analysis of Android devices. Organized into seven chapters, the book looks at the history of the Android platform and its internationalization; it discusses the Android Open Source Project (AOSP) and the Android Market; it offers a brief tutorial on Linux and Android forensics; and it explains how to create an Ubuntu-based virtual machine (VM).
The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to analyze an acquired Android device.
Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful.
  • Named a 2011 Best Digital Forensics Book by InfoSec Reviews
  • Ability to forensically acquire Android devices using the techniques outlined in the book
  • Detailed information about Android applications needed for forensics investigations
  • Important information about SQLite, a file based structured data storage relevant for both Android and many other platforms.

Andrew Hoog: author's other books


Who wrote Android Forensics: Investigation, Analysis and Mobile Security for Google Android? Find out the surname, the name of the author of the book and a list of all author's works by series.

Android Forensics: Investigation, Analysis and Mobile Security for Google Android — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Android Forensics: Investigation, Analysis and Mobile Security for Google Android" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Android Forensics Investigation Analysis and Mobile Security for Google - photo 1
Android Forensics
Investigation, Analysis, and Mobile Security for Google Android

Technical Editor

Andrew Hoog

John McCash

Table of Contents Copyright Acquiring Editor Angelina Ward Development - photo 2

Table of Contents
Copyright

Acquiring Editor: Angelina Ward

Development Editor: Heather Scherer

Project Manager: Danielle S. Miller

Designer: Russell Purdy

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

2011 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Application submitted

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

ISBN: 978-1-59749-651-3

For information on all Syngress publications visit our website at www.syngress.com

Printed in the United States of America

11 12 13 14 15 10 9 8 7 6 5 4 3 2 1

Dedication To my beautiful spouse who has endured my extended absenteeism as I - photo 3

Dedication

To my beautiful spouse who has endured my extended absenteeism as I wrote this book. She is my motivation, my friend, my partner, and the root of my happiness. This book is dedicated to her.

And to my wonderful daughters. You light up our lives and know more about Android forensics than any other 6-year-olds. May your lives be full of learning, success, and happiness.

Acknowledgements

I now understand that the phrase It takes a village applies equally to writing a book as it does to raising children. As such, I wish to acknowledge the village:

My family (see Dedication).

Lee Haas, for excellent editing and attempts to keep me on schedule

Ted Eull, who coined to term deHOOGification, which provides an immense service to you, the reader, as the ideas bouncing around in my head dont always come out that clear when I persist them to words. Ted is also a great friend and all around swell guy. Many thanks to his better half for her patience in putting up with the long hours racked up by motivated geeks at a tech start-up.

Chris Triplett, for diving head first into Android and doing an amazing job at it. Chris is also excellent at patching drywall and providing some comic relief by applying farm English to digital forensics.

Katie Strzempka, for generally taking care of that other book (iPhone and iOS Forensics). Please buy that one too, seriously.

My parents, Stevie and Al, who set me on the correct path from the start and were always there to remind me if I swerved off a bit.

To Harmonee and Hadabogee, whose help with our daughters, dinner, and other areas is immensely appreciated.

To the men and women who bravely serve the public interest in Local, State, and Federal law enforcement and other government agencies. We appreciate all that you do to protect and serve our communities and countries.

To Google, for seeing the value in Android and creating a new paradigm of openness for mobile devices.

To Apple, for providing the opposite paradigm.

And finally to the reader. I hope that you find this book useful and certainly do appreciate your support.

Introduction

The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have struggled as there is a lack of knowledge and supported tools for investigating these devices. This book seeks to address issues not only by providing in-depth insights into Android hardware, software, and file systems but also by sharing techniques for the forensic acquisition and subsequent analysis of these devices. For readers with limited forensic experience, this book creates step-by-step examples that use free, open source utilities so the reader can directly participate in the examples. As the free Android software development kit provides a full Android emulator, readers do not even need to possess an Android device.

As Android devices grow in numbers, an increased awareness of the data they possess will equally grow. Unfortunately, much of that interest will come from cyber criminal organizations who realize that successful attacks against the platform will yield significant results as the devices contain enormous quantities of personal and business information. The solution to this threat requires a deep understanding of the platform not only from core Android developers and manufacturers but also from app developers and corporate security officers. More secure apps will prevent loss of sensitive information as well as strong policies that can be put in place by IT security managers.

Although most of the discussed statistics about Android focus on smartphones and now tablets, there are many more devices that currently or in the near future will run Android. Some examples include vehicles, televisions, GPS, gaming devices, netbooks, and a wide variety of other consumer devices. Android will be present in an increasingly significant percentage of investigations for both forensic analysts and security engineers. Finally, the appeal of Android is not specific to any particular country or region and as such will impact individuals, corporations, and agencies throughout the world.

The following paragraphs contain a brief summary of each of the chapters.

Chapter 1

This chapter provides not only a history of the Android platform but also discusses the Android Open Source Project (AOSP), the internationalization of the platform, the Android Market, a brief Linux tutorial, and a quick fb-non-chapter to Android forensics. It also provides a step-by-step tutorial for creating an Ubuntu-based virtual machine (VM), which will be used throughout the book in examples. The Ubuntu VM is a highly recommended component of this book and can also be used outside of the book for Android forensic cases.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Android Forensics: Investigation, Analysis and Mobile Security for Google Android»

Look at similar books to Android Forensics: Investigation, Analysis and Mobile Security for Google Android. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Android Forensics: Investigation, Analysis and Mobile Security for Google Android»

Discussion, reviews of the book Android Forensics: Investigation, Analysis and Mobile Security for Google Android and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.