Table of Contents
- SIM cards Acquisition and Analysis
- Android Devices Acquisition
- Apple Devices Acquisition
- Windows Phones and BlackBerry Acquisition
- Clouds are Alternative Data Sources
- Understanding SQLite Forensics
- Understanding Plists Forensics
- Deep diving into Android Forensics
- iOS Forensics
- Windows Phones and BlackBerry Forensics
- Exploring JTAG and Chip-off Techniques
