Incident Response: Investigating Computer Crime
Incident Response: Investigating Computer Crime
ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Security Aspects of Mobile Communications
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course
Security analysis of the palm operating system and its weaknesses against malicious code threats
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Forensic imaging of embedded systems using JTAG (boundary-scan)
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Forensic examination of mobile phones
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Reverse engineering for mobile systems forensics with Ares
Proceedings of the 2010 ACM workshop on Insider threats
SP 800-124. Guidelines on Cell Phone and PDA Security
SP 800-124. Guidelines on Cell Phone and PDA Security
Windows Mobile LiveSD Forensics
Journal of Network and Computer Applications
Hi-index | 0.00 |
Forensic specialists periodically encounter unusual devices and new technologies outside of traditional computer forensics. Cell phones are an emerging area with such characteristics. The objective of this guide is twofold: to help organizations evolve appropriate policies and procedures for dealing with cell phones, and to prepare forensic specialists to contend with new circumstances involving cell phones, when they arise. This guide provides an in-depth look into cell phones and explains associated technologies and their effect on the procedures followed by forensic specialists. It also discusses procedures for the preservation, acquisition, examination, analysis, and reporting of digital information present on cell phones, as well as available forensic software tools that support those activities.