Prévia do material em texto
https://player.vimeo.com/video/424127494 https://faradaybag.com/countering-tracking-applications-and-securing-digital-evidence/ https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/841501264&color=%23504a47&auto_play=false&hide_related=true&show_comments=false&show_user=true&show_reposts=false&show_teaser=false https://mentebinaria.gitbook.io/engenharia-reversa/introducao https://www.sciencedirect.com/science/article/pii/S174228761300056X#fig1 https://www.csee.umbc.edu/~dykstra/DFRWS2013_Dykstra_FROST.pdf https://dl.acm.org/doi/fullHtml/10.1145/3361216 http://www.komp.com.br/gallery/iot-investigacao-forense-digital-e-book-p.pdf https://countuponsecurity.com/2014/08/06/computer-forensics-and-investigation-methodology-8-steps/ http://bdtd.ibict.br/vufind/Record/USP_628d18809afe12f574046a7cabd50afe https://blog.ipog.edu.br/tecnologia/5-passos-essenciais-para-realizar-a-percia-forense-em-celulares/ https://faradaybag.com/countering-tracking-applications-and-securing-digital-evidence/ https://hub.packtpub.com/introduction-mobile-forensics/ https://resources.infosecinstitute.com/category/computerforensics/introduction/mobile-forensics/the-mobile-forensics-process-steps-types/#gref https://www.cellebrite.com/pt/pergunte-ao-especialista/guia-pratico-do-checkm8/