Practical mobile forensics is a descent starter guide for those who are new to this and are willing to go a step ahead.
The book covers most of the major mobile platforms. The best part was the inclusion of devices like ipads and tablets. Even though the underlying operating system is same either in tablet or mobile phone, but some generic hardware differences can lead you to a catch-22 situation.
Here is a quick breakthrough based on chapters:
Chapter 1: Introduction to Mobile Forensics
This is a "getting started" chapter with quick introduction to basic terminologies in mobile forensics.
Chapter 2,3,4,5 and 6 : iOS platform
The next consecutive chapters are based on iOS platform and its supporting devices. The second chapter gives a quick look inside the platform. The next chapter discuss about setting up the forensic environment and its required dependencies. It covers steps like: getting and setting iOS firmware, operating modes, iDid etc. The fourth chapter is about acquiring data from iOS backup storage. The chapter nicely explains the backup structure which helps building a better understanding of how iOS structures the data inside the device.
Chapter 5 is all about analysing data extracted in previous 2 chapters. The 6th chapter is the conclusive chapter for iOS platform. It deals with various forensic tools like EIFT, Oxygen forensic and UFED.
Chapter 7, 8, 9, 10 and 11
Chapter 7 to 11 is a series of text dedicated to android platform. I liked the Android section more than iOS owing to the fact that iOS is very much tool driven and there are not many open source tools available. For Android, there are far more possibilities to explore.
Chapter 7 and 8 deals with the basics of Android OS and setting up the forensic environment.
Chapter 9 covers the data extraction techniques. Not to mention that getting root is the first step. Chapter 10 deals with some quick techniques on data recovery.
Chapter 11 covers tips for APK or Application analysis. The chapter discuss briefly how Apps can be extracted and reverse engineered. I was expecting a more in-depth explanation here since malicious APKs are the most sort after subjects for mobile forensic professionals.
Chapter 12: This chapter is an introductory analysis of Windows OS for mobile devices. The chapter covers details like the security structure, basic forensics etc.
Chapter 13: This chapter deals with Blackberry Forensics.
Overall, the book is a good introduction to mobile application forensic and has some pretty interesting things to read and try.
It is highly recommended to try out the practical demonstrations on your own to figure out the real challenges involved during forensics.
The book lays too much emphasis on ready-made tools, which is in a way a good and fast way of doing stuff, but for advanced users, they might want to see some core stuff like building custom forensic tools and techniques.