iPhone Forensics

Recovering Evidence, Personal Data, and Corporate Assets

Nonfiction, Computers, Computer Hardware, Macintosh, Hardware, General Computing
Cover of the book iPhone Forensics by Jonathan Zdziarski, O'Reilly Media
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jonathan Zdziarski ISBN: 9780596555030
Publisher: O'Reilly Media Publication: September 12, 2008
Imprint: O'Reilly Media Language: English
Author: Jonathan Zdziarski
ISBN: 9780596555030
Publisher: O'Reilly Media
Publication: September 12, 2008
Imprint: O'Reilly Media
Language: English

"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!"-Andrew Sheldon, Director of Evidence Talks, computer forensics experts

With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you:

  • Determine what type of data is stored on the device
  • Break v1.x and v2.x passcode-protected iPhones to gain access to the device
  • Build a custom recovery toolkit for the iPhone
  • Interrupt iPhone 3G's "secure wipe" process
  • Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition
  • Recover deleted voicemail, images, email, and other personal data, using data carving techniques
  • Recover geotagged metadata from camera photos
  • Discover Google map lookups, typing cache, and other data stored on the live file system
  • Extract contact information from the iPhone's database
  • Use different recovery strategies based on case needs

And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!"-Andrew Sheldon, Director of Evidence Talks, computer forensics experts

With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you:

And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.

More books from O'Reilly Media

Cover of the book Using SVG with CSS3 and HTML5 by Jonathan Zdziarski
Cover of the book eBay: The Missing Manual by Jonathan Zdziarski
Cover of the book Programming Flex 2 by Jonathan Zdziarski
Cover of the book The Sustainable Network by Jonathan Zdziarski
Cover of the book Deploying OpenStack by Jonathan Zdziarski
Cover of the book Learning PHP Design Patterns by Jonathan Zdziarski
Cover of the book Access Cookbook by Jonathan Zdziarski
Cover of the book Learning UML 2.0 by Jonathan Zdziarski
Cover of the book DVD Studio Pro 3: In the Studio by Jonathan Zdziarski
Cover of the book Revolution in The Valley [Paperback] by Jonathan Zdziarski
Cover of the book Hacking: The Next Generation by Jonathan Zdziarski
Cover of the book BlackBerry Hacks by Jonathan Zdziarski
Cover of the book Getting Started with D3 by Jonathan Zdziarski
Cover of the book SSH, The Secure Shell: The Definitive Guide by Jonathan Zdziarski
Cover of the book Java Enterprise Best Practices by Jonathan Zdziarski
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy