Narrow your search
Listing 1 - 2 of 2
Sort by

Book
Android forensics : investigation, analysis, and mobile security for Google Android
Author:
ISBN: 1283281465 9786613281463 1597496529 1597496510 9781597496520 9781597496513 9781283281461 6613281468 Year: 2011 Publisher: Waltham, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of

Keywords

Android (Electronic resource). --- Computer crimes - Investigation. --- Computer crimes -- Investigation. --- Data recovery (Computer science). --- Google. --- Mobile computing - Security measures. --- Smartphones - Security measures. --- Smartphones -- Security measures. --- Smartphones --- Mobile computing --- Data recovery (Computer science) --- Computer crimes --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Security measures --- Investigation --- Security measures. --- Investigation. --- Android (Electronic resource) --- Information Technology --- General and Others --- Data reconstruction (Computer science) --- Reconstruction, Data (Computer science) --- Recovery, Data (Computer science) --- Smart cell phones --- Smart phones --- Computer forensics --- Cyber forensics --- Cyberforensics --- Internet forensics --- BackRub --- Android operating system (Electronic resource) --- Android OS (Electronic resource) --- Google Android (Electronic resource) --- Android mobile operating system (Electronic resource) --- Electronic data processing --- Context-aware computing --- Portable computers --- Cell phones --- Pocket computers --- Criminal investigation --- Informatique mobile --- Données --- Informatique légale. --- Mesures de sûreté. --- Récupération (informatique) --- Google Android --- Informatique légale --- Données --- Informatique légale --- Mesures de sûreté. --- Récupération (informatique)

Information security theory and practices : smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings
Authors: --- --- ---
ISBN: 9783540723530 3540723536 3540723544 Year: 2007 Publisher: Berlin ; Heidelberg ; New York : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the ?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so.

Keywords

Data protection --- Computer systems --- Smart cards --- Mobile computing --- Ubiquitous computing --- Protection de l'information (Informatique) --- Systèmes informatiques --- Cartes à mémoire --- Informatique mobile --- Informatique omniprésente --- Congresses. --- Access control --- Security measures --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer systems -- Access control -- Congresses. --- Data protection -- Congresses. --- Mobile computing -- Security measures -- Congresses. --- Smart cards -- Congresses. --- Ubiquitous computing -- Security measures -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Pervasive computing --- UbiComp (Computer science) --- Cards, Smart --- Chip cards --- IC cards --- Integrated circuit cards --- Memory cards --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Computers and Society. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Protection --- Distributed processing --- Communication systems --- Embedded computer systems --- Context-aware computing --- Portable computers --- Computer storage devices --- Expansion boards (Microcomputers) --- Near-field communication --- Information Systems. --- Cryptology.

Listing 1 - 2 of 2
Sort by