Get Free Shipping on orders over $79
Mastering Identity and Access Management with Microsoft Azure : Empower users by managing and protecting identities and data, 2nd Edition - Jochen Nickel

Mastering Identity and Access Management with Microsoft Azure

Empower users by managing and protecting identities and data, 2nd Edition

By: Jochen Nickel

Paperback | 26 February 2019 | Edition Number 2

At a Glance

Paperback


$95.69

or 4 interest-free payments of $23.92 with

 or 

Ships in 5 to 7 business days

Master powerful strategies to acquire and analyze evidence from real-life scenarios

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience

Book Description

Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work.

We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and """"""""plays"""""""" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence.

By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud.

What You Will Learn

  • Understand the challenges of mobile forensics
  • Grasp how to properly deal with digital evidence
  • Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices
  • Know what forensic outcome to expect under given circumstances
  • Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods
  • Get in-depth knowledge of the different acquisition methods for all major mobile platforms
  • Discover important mobile acquisition tools and techniques for all of the major platforms

Who This Book Is For

This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required.

More in Computer Security

Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Permanent Record : A Memoir of a Reluctant Whistleblower - Edward Snowden
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Mindf*ck : Inside Cambridge Analytica's Plot to Break the World - Profile Books
Supremacy : AI, ChatGPT and the Race that Will Change the World - Parmy Olson
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF