Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics

Buy
Learning iOS Forensics, 9781783553518 (1783553510), Packt Publishing, 2015

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits that can be used
  • A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS

Who This Book Is For

If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

What You Will Learn

  • Identify an iOS device among various models (iPhone, iPad, and iPod Touch) and verify the iOS version installed
  • Crack or bypass the passcode protection chosen by the user
  • Acquire detailed physical or logical info of an iOS device
  • Retrieve extra information from side channel data leaks
  • Recover information from a local backup and eventually crack the backup password
  • Download backup information stored on iCloud
  • Analyze the system, user, and third-party information from a device, backup, or iCloud
  • Examine malicious apps to identify the stolen data and credentials

In Detail

Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usability, have become one of the mobile market leaders. Millions of people often depend on iOS devices for storing sensitive information, leading to a rise in cybercrime. This has increased the need to successfully retrieve this information from these devices if stolen or lost.

Learning iOS Forensics will give you an insight into the forensics activities you can perform on iOS devices. You will begin with simple concepts such as identifying the specific iOS device and the operating system version and then move on to complex topics such as analyzing the different recognized techniques to acquire the content of the device. Throughout the journey, you will gain knowledge of the best way to extract most of the information by eventually bypassing the protection passcode. After that, you, the examiner, will be taken through steps to analyze the data. The book will give you an overview of how to analyze malicious applications created to steal user credentials and data.

(HTML tags aren't allowed.)

Superstition: Belief in the Age of Science
Superstition: Belief in the Age of Science
From uttering a prayer before boarding a plane, to exploring past lives through hypnosis, has superstition become pervasive in contemporary culture? Robert Park, the best-selling author of Voodoo Science, argues that it has. In Superstition, Park asks why people persist in superstitious convictions long after science has shown...
Ambient Findability
Ambient Findability

How do you find your way in an age of information overload? How can you filter streams of complex information to pull out only what you want? Why does it matter how information is structured when Google seems to magically bring up the right answer to your questions? What does it mean to be "findable" in this day and...

Playing with Infinity: Mathematical Explorations and Excursions
Playing with Infinity: Mathematical Explorations and Excursions
Popular account ranges from counting to mathematical logic and covers the many mathematical concepts that relate to infinity: graphic representation of functions; pairings and other combinations; prime numbers; logarithms and circular functions; formulas, analytical geometry; infinite lines, complex numbers, expansion in the power series;...

LDAP in the Solaris Operating Environment : Deploying Secure Directory Services
LDAP in the Solaris Operating Environment : Deploying Secure Directory Services
LDAP in the Solaris Operating Environment is a follow-on to the Sun BluePrints book Solaris and LDAP Naming Services, and describes the significant improvements to the Solaris LDAP client and directory server. Deploying the Solaris Secured LDAP Client is covered in detail. This Sun...
Beginning Application Development with TensorFlow and Keras: Learn to design, develop, train, and deploy TensorFlow and Keras models as real-world applications
Beginning Application Development with TensorFlow and Keras: Learn to design, develop, train, and deploy TensorFlow and Keras models as real-world applications

You need much more than imagination to predict earthquakes and detect brain cancer cells. Become an expert in designing and deploying TensorFlow and Keras models, and generate insightful predictions with the power of deep learning.

Key Features

  • Cover the basics of neural networks and...
Leadership Passages : The Personal and Professional Transitions That Make or Break a Leader
Leadership Passages : The Personal and Professional Transitions That Make or Break a Leader

Leaders face numerous critical crossroads in their careers, moments that can provide extraordinary learning and growth opportunities or ensnare them and prevent further development. The good thing about these passages is that they’re predictable, and with proper preparation, leaders not only can survive them to become stronger but can use...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy