RSS

Win A Free Copy of Packt’s Practical Mobile Forensics

September 17

We are pleased to announce that Packt publishing is organizing a giveaway especially for you. All you need to do is just comment below the post and win a free e-copy of Practical Mobile Forensics. Two lucky winners stand a chance to win an e-copy of the book. Keep reading to find out how you can be one of the Lucky One.

Practical Mobile Forensics cover

Overview of Practical Mobile Forensics

  • Clear and concise explanations for forensic examinations of mobile devices
  • Master the art of extracting data, recovering deleted data, bypassing screen locks, and much more
  • The first and only guide covering practical mobile forensics on multiple platforms

How to Enter ?

Simply post your expectations from this book in comments section below. You could be one of the 2 lucky participants to win the copy.

DeadLine:

The contest will close on 09/25/2014. Winners will be contacted by email, so be sure to use your real email address when you comment!

Update – 09/26/2014 : The contest is over. Will announce the winners shortly.

Update – 09/28/2014 : Lucky winners are listed below. Congrats.

Simon Lang
Pralhad

 

Posted by on September 17, 2014 in Android, iPhone

22 Comments

Tags:

22 responses to “Win A Free Copy of Packt’s Practical Mobile Forensics

  1. Anand Rathi

    September 17, 2014 at 10:41 am

    I am really interested to get deep knowledge of mobile application security. Your posts always help me to think about application security on layers wise.

     
  2. woo

    September 17, 2014 at 10:46 am

    we want to know much more about Mobile Forensics which is so useful and Amazing!Thank you!

     
  3. Shinto

    September 17, 2014 at 11:28 am

    I still feel that lot of security threats related to mobile devices are still unexplored. We don’t have a strict process or skill set unlike a web application to analyse a mobile app or your mobile device.

    I hope the book will cover the techniques to analyse dynamic file systems/temp files/registry content/memory of a mobile device to find out the issues in my device or my mobile apps way before an attacker do and exploit me.

    Best of luck 🙂

     
  4. Simon Lang

    September 17, 2014 at 12:43 pm

    As an avid Mobile Phone Examiner, it is great to see an up to date book being released.

    I am keen to see the advice given by a second pair of eyes in these matters.

     
  5. gangzimo

    September 17, 2014 at 1:46 pm

    Hope this book can contain up-to-date info together with detailed exmaples. Learning by practice is always a good way to master new knowledge:)

     
  6. gangzimo

    September 17, 2014 at 1:50 pm

    Hope the practices are targeting to new devices, since I’ve already seen that some examples in other books are kind of old. Even though the theory is explained quite clear, lacking of real “battle” seems miss something.

     
  7. Archit Mehta

    September 17, 2014 at 2:03 pm

    Some very relevant case studies.
    Feel free to add complex things with web reference.
    Things does and don’ts for user, must needed to take care.

     
  8. mascalz1

    September 17, 2014 at 5:03 pm

    I can’t wait to examine this action-packed guide 😉

     
  9. Mayur singru

    September 17, 2014 at 11:53 pm

    As we all know about securitylearn.net and it’s blogposts this book will be nothing short of all the other books published in mobile security like iOS hackers handbook and so on. Also it will give a deep insight into all the four mobile platforms and it’s inner working to perform successful mobile forensic.

     
  10. Vivek

    September 18, 2014 at 11:26 am

    Looking to get some in depth information on the blackberry side. There are a good number of resources for ios, android and windows phone but bb10 remains obscure.am also hoping for a good number of exercises to work upon and get comfortable with tools and approaches.

     
  11. Julian S.

    September 18, 2014 at 7:46 pm

    I loved your posts about iOS forensic and I learned a lot about iOS thanks to you.
    I would love to win that e-book to learn even more about mobile forensic.

     
  12. Lohit Kumar Margoor

    September 19, 2014 at 11:35 am

    I am working in sinformation security domain in a bank. So mobile forensics knowledge clearly enhance my skills in the coming future.

     
  13. Bhaskar P

    September 20, 2014 at 9:01 am

    First of all, Congrats Satish! Very happy to see your progress, wishing all the very best for your future endeavors.

    For IT Security practitioners out there: This book is prepared by a person whom we seen in action breaking most of the secure code practices and who’s been a trainer since long. I am expecting the same kind of code breaking techniques were filled in the current book to share his knowledge and experience which can help others to learn without much hustle.
    Go for it guys!!

    Regards
    Bhaskar

     
  14. Dr Who

    September 21, 2014 at 5:52 pm

    This book will be the best practice guidlines for me on mobile forensics, I cant wait anymore.
    Thank you.

     
  15. Pralhad

    September 23, 2014 at 9:20 am

    Have learnt a lot on mobile appsec, forensics,reversing from http://www.securitylearn.net/ and was eagerly waiting for the book to be released with detailed methodology and more practical examples in the same domain.

    Great Job Satish 😉

     
  16. Sumit Shrivastava

    September 23, 2014 at 9:31 am

    Being a computer forensic expert, lately I have been getting my hands dirty on some mobile evidence. There is no standard approach of how to perform forensic analysis on a mobile / smartphone evidence. I would expect this book to walk us through some standard techniques that we can follow or some scenario based techniques and what tools to use when kind of explanations are expected. Really looking forward for this book.

     
  17. Vivek

    September 23, 2014 at 11:25 am

    I expect that the author dives deep into the potential threats and vulnerabilities around various mobile platforms. Given that mobiles and tablets (both predominantly running on similar operating systems) have taken over desktops and laptops, a focused approach towards security of these devices is a must have. This book, I hope, would cover areas that touch base with breaking-in, exploits, security around the device, the platform and applications built on top. I also expect that it gives a possible lead on protecting and securing, which is a much of a need now.

     
  18. Prudhvi

    September 24, 2014 at 5:21 pm

    awesome 😀

     
  19. Fraser

    September 25, 2014 at 10:59 pm

    Looks like an interesting book, I’ll be looking out for this one.

     
  20. HyunTak

    November 13, 2014 at 3:13 pm

    I am really interested in analyzing mobile devices.

     
  21. vodka

    May 27, 2015 at 2:03 pm

    i really looking forward the tools , theory and methods in it

     
  22. Robin

    September 22, 2015 at 6:32 pm

    I’m a student pursuing my Masters in Information Security, and my keen interest is in Mobile Forensics and I have always been wanting to expand my skill-set through different sources and Rohit Tamma-The Author is one of my favourite, whom I’ve been following from a long time.
    Desperate to read this book to improve my skills and give the community a secure platform