Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics

Buy
Learning iOS Forensics, 9781783553518 (1783553510), Packt Publishing, 2015

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits that can be used
  • A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS

Who This Book Is For

If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

What You Will Learn

  • Identify an iOS device among various models (iPhone, iPad, and iPod Touch) and verify the iOS version installed
  • Crack or bypass the passcode protection chosen by the user
  • Acquire detailed physical or logical info of an iOS device
  • Retrieve extra information from side channel data leaks
  • Recover information from a local backup and eventually crack the backup password
  • Download backup information stored on iCloud
  • Analyze the system, user, and third-party information from a device, backup, or iCloud
  • Examine malicious apps to identify the stolen data and credentials

In Detail

Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usability, have become one of the mobile market leaders. Millions of people often depend on iOS devices for storing sensitive information, leading to a rise in cybercrime. This has increased the need to successfully retrieve this information from these devices if stolen or lost.

Learning iOS Forensics will give you an insight into the forensics activities you can perform on iOS devices. You will begin with simple concepts such as identifying the specific iOS device and the operating system version and then move on to complex topics such as analyzing the different recognized techniques to acquire the content of the device. Throughout the journey, you will gain knowledge of the best way to extract most of the information by eventually bypassing the protection passcode. After that, you, the examiner, will be taken through steps to analyze the data. The book will give you an overview of how to analyze malicious applications created to steal user credentials and data.

(HTML tags aren't allowed.)

Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.

This unique collection details how to
...

Theoretical Thermotics: Transformation Thermotics and Extended Theories for Thermal Metamaterials
Theoretical Thermotics: Transformation Thermotics and Extended Theories for Thermal Metamaterials
This book focuses on theoretical thermotics, the theory of transformation thermotics and its extended theories for the active control of macroscopic thermal phenomena of artificial systems, which is in sharp contrast to classical thermodynamics comprising the four thermodynamic laws for the passive description of macroscopic thermal phenomena of...
Molecular Mechanisms of Cancer
Molecular Mechanisms of Cancer

This book describes molecular processes whose deregulation is important in the formation of tumors. The material is developed from basic cell signaling pathways to their roles in the clinical manifestation of specific cancers. Topics covered include molecular events intrinsic to tumor cells (leading to growth deregulation, extended lifespan,...


Building Tag Clouds in Perl and PHP
Building Tag Clouds in Perl and PHP

Tag clouds are everywhere on the web these days. First popularized by the web sites Flickr, Technorati, and del.icio.us, these amorphous clumps of words now appear on a slew of web sites as visual evidence of their membership in the elite corps of "Web 2.0." This PDF analyzes what is and isn't a tag cloud, offers design...

Apple Training Series : Desktop and Portable Systems (2nd Edition)
Apple Training Series : Desktop and Portable Systems (2nd Edition)
This authoritative, Apple-Certified training course is designed both for professionals who support Apple computers as well as Mac enthusiasts who want to upgrade, service, or troubleshoot their favorite machines. Fully revised, this second edition covers Apple's new models, including the popular Mac mini and the iMac G5. Keyed to the learning...
Jack Welch and the 4 E's of Leadership: How to Put GE's Leadership Formula to Work in Your Organization
Jack Welch and the 4 E's of Leadership: How to Put GE's Leadership Formula to Work in Your Organization

Proven leadership lessons from the author of the international bestseller The Welch Way

Techniques Jack Welch used to create great leaders and drive unprecedented financial performance

Jack Welch and GE used the celebrated 4e model to measure leadership potential and enhance profitability at...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy