Buy New
$45.62
Qty:1
  • List Price: $69.95
  • Save: $24.33 (35%)
Only 11 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Sell yours for a Gift Card
We'll buy it for $12.76
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Android Forensics: Investigation, Analysis and Mobile Security for Google Android Paperback – June 15, 2011

ISBN-13: 978-1597496513 ISBN-10: 1597496510 Edition: 1st

Buy New
Price: $45.62
32 New from $41.62 11 Used from $25.00
Rent from Amazon Price New from Used from
Kindle
"Please retry"
$16.93
Paperback
"Please retry"
$45.62
$41.62 $25.00
12%20Days%20of%20Deals%20in%20Books

Frequently Bought Together

Android Forensics: Investigation, Analysis and Mobile Security for Google Android + iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices + Digital Forensics with Open Source Tools
Price for all three: $130.32

Buy the selected items together
NO_CONTENT_IN_FEATURE
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 432 pages
  • Publisher: Syngress; 1 edition (June 15, 2011)
  • Language: English
  • ISBN-10: 1597496510
  • ISBN-13: 978-1597496513
  • Product Dimensions: 7.5 x 0.9 x 9.2 inches
  • Shipping Weight: 1.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.1 out of 5 stars  See all reviews (7 customer reviews)
  • Amazon Best Sellers Rank: #394,191 in Books (See Top 100 in Books)

Editorial Reviews

Review

"If you want to truly understand and perform forensics on Android this is the book. There is no other reference that goes to this level of detail on the Android operating systems idiosyncrasies and quirks. Android Forensics is a must have for the mobile device examiner's bookshelf."-Jim Steele, Director of Digital Forensics , a Tier 1 Wireless Carrier

"Andrew Hoog in his latest book, Android Forensics, provides exceptionally well written coverage of Android for the Computer Forensics Investigator. No small task given the ever changing nature of Google's preeminent mobile operating system."--Matthew M. Shannon, Principal, F-Response

".provides an excellent and comprehensive coverage of the Android platform, including its design, implementation, operation, investigation and analysis. At 364 pages of content, organized over seven chapters, with a focus on the 'practical' - demonstrating system design, implementation, operation and investigation, for instance, through hands-on "experiments" - this sizable text will resonate particularly well with readers disposed to activity-centric, learning-by-doing styled narrative. The text is peppered throughout with device and application (GUI) screenshots, as well as command line execution/output and directory listings."--InfosecReviews.com

"In conclusion, we feel that Android Forensics is a good introduction to a field that still seems very 'fresh' and new to forensic examiners. As a quick reference during forensic analysis, the last chapter proves to be an excellent resource."--Computer and Security

"At 364 pages of content, organized?over seven chapters, with a focus on?the 'practical' - demonstrating system design, implementation, operation and investigation, for instance, through hands- on "experiments" - this sizable text will resonate particularly well with readers disposed to activity-centric, learning-by- doing styled narrative.With a practical focus from the outset that includes how to acquire and install the Android SDK and build an Android Virtual Device (AVD), this text is particularly suited to those disposed to?a hands-on approach to learning about the Android platform from a security and investigation perspective."--Best Digital Forensics Book in InfoSecReviews Book Awards

From the Back Cover

Android is now the world's most popular mobile device platform and still growing at an astonishing rate. Android Forensics provides a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, a detailed review of forensic acquisition techniques and strategies for the subsequent analysis required. A heavy emphasis on open source tools and step-by-step examples are a primary focus on this book.

  • Learn techniques to forensically acquire Android devices
  • Includes information about Android applications needed for forensics investigations
  • Entire chapter focused on Android Device, Data and App Security, which can assist not only forensic investigators but also for app developers and IT security managers

More About the Author

Andrew Hoog is a computer scientist, certified forensic analyst (GCFA and CCE), computer and mobile forensics researcher, author of two forensic and security books, expert witness and co-founder of viaForensics, an innovative digital forensic and security firm. He divides his energies between investigations, forensic software development, and research in digital forensics and security. He also has two patents pending in the areas of forensics and data recovery.

He lives in Oak Park, IL, where he enjoys spending time with his family, traveling, great wine, science fiction, running and tinkering with geeky gadgets.

Customer Reviews

4.1 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

13 of 13 people found the following review helpful By RestrictedBytes on July 5, 2011
Format: Paperback
As Brian Carrier is to file system forensics and Harlan Carvey is to Windows registry analysis, Andrew Hoog is to the Android operating system. The level of detail in this book demonstrates a deep understanding of this complex and unique operating system. Chapter 1 begins with an overview of both Android and Linux in general. Instructions are provided for creating a virtual machine environment so the reader can follow along with the examples in the book. Throughout, the reader is encouraged to follow along, and ample opportunities are provided. This is highly appreciated as most technical books overwhelm the reader with information rather than guide them along the way. Chapter 2 presents an overview of the hardware that is supported by the Android OS. Chapter 3 begins the discussion of the Android OS proper. Included in this chapter are instructions on augmenting the previously created VM with the Android SDK providing additional tools for use in analysis. Chapter 4 is devoted to discussing the file systems likely to be encountered in the Android environment. Special attention is paid to YAFFS and YAFFS2. Chapter 5 discusses securing the data within the device. Also presented are recommendations for securely using Android devices in an enterprise environment. Additional advice is given for both users and developers to limit the exposure of sensitive data. Chapter 6 covers the most significant portion of the book with instructions on acquiring the data from device. Logical and physical acquisitions from the handset as well as the removable storage are discussed. The issue of passcode circumvention is discussed along with potential solutions. Chapter 7 finishes with timeline analysis techniques for the YAFFS file system and the FAT file system. Additional locations of interest to both security researchers and forensic analysts are also presented. Overall the book is enjoyable to read and will be a valuable asset for both forensic analysts and researchers.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 7 people found the following review helpful By DR on January 13, 2013
Format: Kindle Edition Verified Purchase
One reviewer commented that code samples are unreadable for the Kindle version. That seems to be true for standard, small screen, non-color devices (i.e. classic Kindles). However, on my iPad Kindle app the code samples are fine. In fact you can unpinch them to zoom in, and rotate your device to portrait mode if needed. Also, the online Kindle Cloud Reader shows the code samples clearly. Hopefully future conversions of technical texts such as this one will be done with more care to allow resizing of special text. For now you will need your PC with the free Cloud Reader, or some large screen tablet device to take advantage of this ebook.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 7 people found the following review helpful By gscardwe on July 11, 2011
Format: Paperback Verified Purchase
Andrew Hoog has done an outstanding job presenting a complex topic that should interest not only advanced forensic practitioners but the typical Android Smartphone user as well. Highly recommended, whether its for work, or you want to know what "rooting" your Android phone actually does to the device.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 3 people found the following review helpful By rb6 on December 28, 2011
Format: Paperback
A very well written book that contains Android essentials and advanced topics. Andrew Hoog does a great job explaining concepts and making even the most complex topics understandable. Highly recommended!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?