Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics

Buy
Learning iOS Forensics, 9781783553518 (1783553510), Packt Publishing, 2015

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits that can be used
  • A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS

Who This Book Is For

If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

What You Will Learn

  • Identify an iOS device among various models (iPhone, iPad, and iPod Touch) and verify the iOS version installed
  • Crack or bypass the passcode protection chosen by the user
  • Acquire detailed physical or logical info of an iOS device
  • Retrieve extra information from side channel data leaks
  • Recover information from a local backup and eventually crack the backup password
  • Download backup information stored on iCloud
  • Analyze the system, user, and third-party information from a device, backup, or iCloud
  • Examine malicious apps to identify the stolen data and credentials

In Detail

Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usability, have become one of the mobile market leaders. Millions of people often depend on iOS devices for storing sensitive information, leading to a rise in cybercrime. This has increased the need to successfully retrieve this information from these devices if stolen or lost.

Learning iOS Forensics will give you an insight into the forensics activities you can perform on iOS devices. You will begin with simple concepts such as identifying the specific iOS device and the operating system version and then move on to complex topics such as analyzing the different recognized techniques to acquire the content of the device. Throughout the journey, you will gain knowledge of the best way to extract most of the information by eventually bypassing the protection passcode. After that, you, the examiner, will be taken through steps to analyze the data. The book will give you an overview of how to analyze malicious applications created to steal user credentials and data.

(HTML tags aren't allowed.)

Microsoft Dynamics AX 2012 Services
Microsoft Dynamics AX 2012 Services

Because an ERP system like Microsoft Dynamics AX 2012 plays a central role in an organization, there will always be the need to integrate it with other applications. In many cases, services are the preferred way of doing this, and Microsoft Dynamics AX 2012 is now more flexible than ever when it comes to the creation and use of these...

JAVA 14: DEVELOPMENT OF APPLICATIONS WITH JAVAFX
JAVA 14: DEVELOPMENT OF APPLICATIONS WITH JAVAFX
This book is the fourteenth in a series of books on software development and deals with
JavaFX. The book introduces JavaFX as an alternative to Swing and Java2D, thus treating
how to work with 2D graphics in JavaFX, as well as the main components and layout.
The goal is that you will quickly be able to write programs
...
Z80 Assembly Language Programming
Z80 Assembly Language Programming

This book describes assembly language programming. It assumes that you are familiar with An Introduction To Microcomputers Volume 1 —Basic Concepts (particulary Chapters 6 and 7). This book does not discuss  the general features of computers, microcomputers, addressing methods, or instruction sets; you should refer to An...


Linux Device Drivers, 3rd Edition
Linux Device Drivers, 3rd Edition

Over the years, this bestselling guide has helped countless programmers learn how to support computer peripherals under the Linux operating system, and how to develop new hardware under Linux. Now, with this third edition, it's even more helpful, covering all the significant changes to Version 2.6 of the Linux kernel. Includes...

Building Microsoft ASP.NET Applications for Mobile Devices, Second Edition
Building Microsoft ASP.NET Applications for Mobile Devices, Second Edition

Extend your programming expertise across the widest range of mobile devices with this incisive guide to Microsoft ASP.NET mobile controls. Now integrated into Microsoft Visual Studio .NET 2003, ASP.NET mobile controls enable you to build applications that render intelligently on different devices—regardless of markup language, browser, or...

Software Process and Product Measurement: International Conference, IWSMMENSURA 2007, Palma de Mallorca, Spain, November 5-8, 2007, Revised Papers
Software Process and Product Measurement: International Conference, IWSMMENSURA 2007, Palma de Mallorca, Spain, November 5-8, 2007, Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Software Measurement, IWSM-Mensura 2007, held in Palma de Mallorca, Spain, in November 2007.

The 16 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers deal with aspects of software measurement...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy