LEADER 00929nam0-22003131i-450- 001 990003333290403321 005 20080520113008.0 035 $a000333329 035 $aFED01000333329 035 $a(Aleph)000333329FED01 035 $a000333329 100 $a20030910d1988----km-y0itay50------ba 101 0 $aeng 102 $aHK 105 $ay-------001yy 200 1 $aOthello by William Shakespeare$bMacMillan Master Guides$cwith an introduction by Harold Brooks$fTony Bromham 210 $aBasingstoke$cMacmillan education$d1988 215 $ax,94 p.$d22 cm 225 1 $aMacMillan master guides 610 0 $aDrama in English 676 $a822.6 700 1$aShakespeare,$bWilliam$f<1564-1616>$0132200 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003333290403321 952 $a822.6 SHA/6$b1205$fDECLI 959 $aDECLI 996 $aOthello by William Shakespeare$9448572 997 $aUNINA LEADER 04367nam 2200709Ia 450 001 9910461406503321 005 20200520144314.0 010 $a1-283-28146-5 010 $a9786613281463 010 $a1-59749-652-9 035 $a(CKB)2670000000092966 035 $a(EBL)776188 035 $a(OCoLC)751987663 035 $a(SSID)ssj0000507851 035 $a(PQKBManifestationID)11358745 035 $a(PQKBTitleCode)TC0000507851 035 $a(PQKBWorkID)10550151 035 $a(PQKB)10519850 035 $a(MiAaPQ)EBC776188 035 $a(CaSebORM)9781597496513 035 $a(Au-PeEL)EBL776188 035 $a(CaPaEBR)ebr10502559 035 $a(CaONFJC)MIL328146 035 $a(EXLCZ)992670000000092966 100 $a20110517d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAndroid forensics$b[electronic resource] $einvestigation, analysis, and mobile security for Google Android /$fAndrew Hoog ; John McCash, technical editor 205 $a1st edition 210 $aWaltham, MA $cSyngress$dc2011 215 $a1 online resource (393 p.) 300 $aDescription based upon print version of record. 311 $a1-59749-651-0 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Android Forensics; Copyright; Dedication; Contents; Acknowledgements; Introduction; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Website; About the Author; About the Technical Editor; Chapter 1 -Android and mobile forensics; Introduction; Android platform; Linux, open source software, and forensics; Android Open Source Project; Internationalization; Android Market; Android forensics; Summary; References; Chapter 2 -Android hardware platforms; Introduction; Overview of core components; Overview of different device types; ROM and boot loaders 327 $aManufacturersAndroid updates; Specific devices; Summary; References; Chapter 3 -Android software development kit and android debug bridge; Introduction; Android platforms; Software development kit (SDK); Android security model; Forensics and the SDK; Summary; References; Chapter 4 -Android file systems and data structures; Introduction; Data in the Shell; Type of memory; File systems; Mounted file systems; Summary; References; Chapter 5 -Android device, data, and app security; Introduction; Data theft targets and attack vectors; Security considerations; Individual security strategies 327 $aCorporate security strategiesApp development security strategies; Summary; References; Chapter 6 -Android forensic techniques; Introduction; Procedures for handling an Android device; Imaging Android USB mass storage devices; Logical techniques; Physical techniques; Summary; References; Chapter 7 -Android application and forensic analysis; Introduction; Analysis techniques; FAT forensic analysis; YAFFS2 forensic analysis; Android app analysis and reference; Summary; References; Index 330 $aThe open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of 606 $aSmartphones$xSecurity measures 606 $aMobile computing$xSecurity measures 606 $aData recovery (Computer science) 606 $aComputer crimes$xInvestigation 608 $aElectronic books. 615 0$aSmartphones$xSecurity measures. 615 0$aMobile computing$xSecurity measures. 615 0$aData recovery (Computer science) 615 0$aComputer crimes$xInvestigation. 676 $a005.4 676 $a005.4/46 676 $a005.446 676 $a363.25 700 $aHoog$b Andrew$0857228 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910461406503321 996 $aAndroid forensics$91914163 997 $aUNINA LEADER 00939nam a22002531i 4500 001 991004148239707536 005 20031005200045.0 008 031111s1990 it |||||||||||||||||ita 020 $a8836801641 035 $ab12530396-39ule_inst 035 $aARCHE-056366$9ExL 040 $aDip.to Lingue$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a833.6 100 1 $aKleist, Heinrich :$cvon$086899 245 10$aSanta Cecilia o la potenza della musica /$cHeinrich von Kleist 260 $aFirenze :$bPassigli,$c1990 300 $a95 p. ;$c17 cm 440 0$aBiblioteca del viaggiatore ;$v31 907 $a.b12530396$b02-04-14$c13-11-03 912 $a991004148239707536 945 $aLE012 838.6 KLE 6$g1$i2012000215894$lle012$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12973105$z13-11-03 996 $aSanta Cecilia o la potenza della musica$9173368 997 $aUNISALENTO 998 $ale012$b13-11-03$cm$da $e-$fita$git $h0$i1