The fast-growing nature of instant messaging applications usage on android mobile devices brought about a proportional increase in the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store a significant amount of information in their various memory partitions such as sd card, RAM, NAND, and user data respectively when IM applications such as WhatsApp, Skype, Facebook, and Tango are executed on them. The research analyses Instant messaging applications on emulated Android devices using different forensics techniques. Deleted communication chats among the emulated devices were retrieved from their database sources such as userdata-qemu.img, userdata.img, sdcard.img, among others. The research findings revealed that instant messaging applications leave data as potential digital evidence on emulated Android devices even when the chat is deleted.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The fast-growing nature of instant messaging applications usage on android mobile devices brought about a proportional increase in the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store a significant amount of information in their various memory partitions such as sd card, RAM, NAND, and user data respectively when IM applications such as WhatsApp, Skype, Facebook, and Tango are executed on them. The research analyses Instant messaging applications on emulated Android devices using different forensics techniques. Deleted communication chats among the emulated devices were retrieved from their database sources such as userdata-qemu.img, userdata.img, sdcard.img, among others. The research findings revealed that instant messaging applications leave data as potential digital evidence on emulated Android devices even when the chat is deleted. 180 pp. Englisch. N° de réf. du vendeur 9786203928105
Quantité disponible : 2 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Ashawa MosesMoses Ashawa received the B.Sc. (Hon) in computer Science from Benue State University Makurdi, M.Sc. in Computer Security and Digital Forensics (Distinction) from the University of Bedfordshire, He works as a System Analy. N° de réf. du vendeur 500660866
Quantité disponible : Plus de 20 disponibles
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26395831926
Quantité disponible : 4 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 400577961
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18395831932
Quantité disponible : 4 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -The fast-growing nature of instant messaging applications usage on android mobile devices brought about a proportional increase in the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store a significant amount of information in their various memory partitions such as sd card, RAM, NAND, and user data respectively when IM applications such as WhatsApp, Skype, Facebook, and Tango are executed on them. The research analyses Instant messaging applications on emulated Android devices using different forensics techniques. Deleted communication chats among the emulated devices were retrieved from their database sources such as userdata-qemu.img, userdata.img, sdcard.img, among others. The research findings revealed that instant messaging applications leave data as potential digital evidence on emulated Android devices even when the chat is deleted.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 180 pp. Englisch. N° de réf. du vendeur 9786203928105
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The fast-growing nature of instant messaging applications usage on android mobile devices brought about a proportional increase in the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store a significant amount of information in their various memory partitions such as sd card, RAM, NAND, and user data respectively when IM applications such as WhatsApp, Skype, Facebook, and Tango are executed on them. The research analyses Instant messaging applications on emulated Android devices using different forensics techniques. Deleted communication chats among the emulated devices were retrieved from their database sources such as userdata-qemu.img, userdata.img, sdcard.img, among others. The research findings revealed that instant messaging applications leave data as potential digital evidence on emulated Android devices even when the chat is deleted. N° de réf. du vendeur 9786203928105
Quantité disponible : 1 disponible(s)