Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics

Buy
Learning iOS Forensics, 9781783553518 (1783553510), Packt Publishing, 2015

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits that can be used
  • A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS

Who This Book Is For

If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

What You Will Learn

  • Identify an iOS device among various models (iPhone, iPad, and iPod Touch) and verify the iOS version installed
  • Crack or bypass the passcode protection chosen by the user
  • Acquire detailed physical or logical info of an iOS device
  • Retrieve extra information from side channel data leaks
  • Recover information from a local backup and eventually crack the backup password
  • Download backup information stored on iCloud
  • Analyze the system, user, and third-party information from a device, backup, or iCloud
  • Examine malicious apps to identify the stolen data and credentials

In Detail

Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usability, have become one of the mobile market leaders. Millions of people often depend on iOS devices for storing sensitive information, leading to a rise in cybercrime. This has increased the need to successfully retrieve this information from these devices if stolen or lost.

Learning iOS Forensics will give you an insight into the forensics activities you can perform on iOS devices. You will begin with simple concepts such as identifying the specific iOS device and the operating system version and then move on to complex topics such as analyzing the different recognized techniques to acquire the content of the device. Throughout the journey, you will gain knowledge of the best way to extract most of the information by eventually bypassing the protection passcode. After that, you, the examiner, will be taken through steps to analyze the data. The book will give you an overview of how to analyze malicious applications created to steal user credentials and data.

(HTML tags aren't allowed.)

Designing with Web Standards (3rd Edition)
Designing with Web Standards (3rd Edition)

Best-selling author, designer, and web standards evangelist Jeffrey Zeldman has revisited his classic, industry-shaking guidebook. Updated in collaboration with co-author Ethan Marcotte, this third edition covers improvements and challenges in the changing environment of standards-based design.

Written in the same engaging
...

Pro Couchbase Server
Pro Couchbase Server

Pro Couchbase Server is a hands-on guide for developers and administrators who want to take advantage of the power and scalability of Couchbase Server in their applications. This book takes you from the basics of NoSQL database design, through application development, to Couchbase Server administration. Never have document databases...

Excel 2010 for Educational and Psychological Statistics: A Guide to Solving Practical Problems
Excel 2010 for Educational and Psychological Statistics: A Guide to Solving Practical Problems

Excel has become an important and nearly ubiquitous classroom and office resource for students and practitioners who are faced with solving statistical problems on an everyday basis. Despite this, there has yet to emerge a truly practical, “how-do-I-do-it” manual that teaches the various applications and...


AIDS in South Asia: Understanding And Responding to a Heterogenous Epidemic (Health, Nutrition, and Population Series)
AIDS in South Asia: Understanding And Responding to a Heterogenous Epidemic (Health, Nutrition, and Population Series)

South Asia's HIV epidemic is highly heterogeneous. As a result, informed, prioritized, and effective responses necessitate an understanding of the epidemic diversity between and within countries. Further spread of HIV in South Asia is preventable. The future size of South Asia's epidemic will depend on an effective two-pronged...

IEC 61131-3: Programming Industrial Automation Systems: Concepts and Programming Languages, Requirements
IEC 61131-3: Programming Industrial Automation Systems: Concepts and Programming Languages, Requirements
From the reviews of the first edition:

"This book provides a comprehensive introduction to IEC61131-3, the new International Electrotechnical Commission standard governing the concepts and programming languages for industrial control systems. … Through its coverage of the subject, this superb reference text will be invaluable to PLC...

Representations for Genetic and Evolutionary Algorithms
Representations for Genetic and Evolutionary Algorithms

One of the major challenges for researchers in the field of management science,
information systems, business informatics, and computer science is to develop
methods and tools that help organizations, such as companies or public institutions,
to fulfill their tasks efficiently. However, during the last decade,
...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy