Also a big thank you to Youssef for his daily encouragement and for giving me all the support I needed, you are my big bro. I would also like to thank all my friends, especially Mounir, who does not miss a chance to encourage me and to tell me that I can achieve this and who bought me candies so I'd have sufficient energy while I was writing this book, thank you brother, you are the best. My sisters Soundous, Kaoutar, and Souad for always supporting and telling me that they are proud of me, I love you. My mom, Halima thank you for your unconditional love and support, I love you, and this book is for you. This book is for my dad, Abdelkebir I know how proud you are of me but I want you to know how proud I am of you you've always been an engine for me, I love you. I owe my deepest gratitude to a lot of people, including my family and my friends. He has been involved in IT security for more than 10 years and has dozen of publications and a lot of research in different computer security fields under his name. He has an interest in low-level techniques and in recent years he has developed an interest in computer and smartphone forensics. NET reverse code engineering and software security. ISBN 978-1-78528-781-7 Ĭontent Development Editor Trusha ShriyanĪbout the Author Soufiane Tahiri is an independent computer security researcher and scienceĮnthusiast from Morocco, who specializes in. Livery Place 35 Livery Street Birmingham B3 2PB, UK. However, Packt Publishing cannot guarantee the accuracy of this information. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. However, the information contained in this book is sold without warranty, either express or implied. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Mastering Mobile Forensics Copyright © 2016 Packt PublishingĪll rights reserved. Develop the capacity to dig deeper into mobile device data acquisition
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |