iPhone and iOS Forensics
Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
- 1st Edition - June 16, 2011
- Latest edition
- Authors: Andrew Hoog, Katie Strzempka
- Language: English
iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps.… Read more
Robotics & automation week
Empowering Progress
Up to 20% on Robotics and Automation Resources!
This book consists of 7 chapters covering device features and functions; file system and data storage; iPhone and iPad data security; acquisitions; data and application analysis; and commercial tool testing.
This book will appeal to forensic investigators (corporate and law enforcement) and incident response professionals.
- Learn techniques to forensically acquire the iPhone, iPad and other iOS devices
- Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers
- In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system
- Acknowledgments
- Preface
- Website
- About the Authors
- About the Technical Editor
- Chapter 1. Overview
- Publisher Summary
- Chapter points:
- Introduction
- Summary
- References
- Chapter 2. Device features and functions
- Publisher Summary
- Chapter points:
- Introduction
- Summary
- References
- Chapter 3. File system and data storage
- Publisher Summary
- Information in this chapter:
- Introduction
- Summary
- References
- Chapter 4. iPhone and iPad data security
- Publisher Summary
- Chapter points:
- Introduction
- Summary
- References
- Chapter 5. Acquisitions
- Publisher Summary
- Information in this chapter:
- Introduction
- Summary
- References
- Chapter 6. Data and application analysis
- Publisher Summary
- Chapter points:
- Introduction
- Summary
- References
- Chapter 7. Commercial tool testing
- Publisher Summary
- Chapter points:
- Introduction
- Summary
- Reference
- Appendix A. iTunes backup location
- Appendix B. Tools to analyze common file and data types
- Appendix C. iPhone file system
- Index
"...a must-have book for those who are professionally engaged in the practice of digital forensics. The book has a wealth of information, and one would not want to be cross-examined as an expert witness without having read this book first."—The Journal of Digital Forensics, Security and Law ,Vol. 8, No. 4, 2013
- Edition: 1
- Latest edition
- Published: July 25, 2011
- Language: English
AH
Andrew Hoog
KS
Katie Strzempka
Ms. Strzempka received her Master’s degree from Purdue University in Cyber Forensics and has a B.S. in Computer and Information Technology. Prior to working for viaForensics, Katie worked for 3 years in Information Security for a Fortune 500 company, handling firewall administration and assisting with internal and external network connectivity.