iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

ISBN-10:
1597496596
ISBN-13:
9781597496599
Pub. Date:
06/30/2011
Publisher:
Elsevier Science
ISBN-10:
1597496596
ISBN-13:
9781597496599
Pub. Date:
06/30/2011
Publisher:
Elsevier Science
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

$69.95
Current price is , Original price is $69.95. You
$55.46 
  • SHIP THIS ITEM
    Not Eligible for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.

$15.61 
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.

    • Condition: Good
    Note: Access code and/or supplemental material are not guaranteed to be included with used textbook.

Overview

iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner, so that all of the methods and procedures outlined in the text can be taken into any courtroom. It includes information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.

This book consists of 7 chapters covering device features and functions; file system and data storage; iPhone and iPad data security; acquisitions; data and application analysis; and commercial tool testing.

This book will appeal to forensic investigators (corporate and law enforcement) and incident response professionals.

Product Details

ISBN-13: 9781597496599
Publisher: Elsevier Science
Publication date: 06/30/2011
Pages: 336
Product dimensions: 7.50(w) x 9.10(h) x 0.90(d)

About the Author

Andrew Hoog is a computer scientist, certified forensic analyst (GCFA and CCE), computer and mobile forensics researcher, former adjunct professor (assembly language) and owner of viaForensics, an innovative computer and mobile forensic firm. He divides his energies between investigations, research and training about the computer and mobile forensic discipline. He writes computer/mobile forensic how-to guides, is interviewed on radio programs and lectures and trains both corporations and law enforcement agencies. As the foremost expert in Android Forensics, he leads expert level training courses, speaks frequently at conferences and is writing a book on Android forensics.

Katie Strzempka is a Technology Consultant with viaForensics, a computer and mobile forensics firm. She performs forensic investigations, security audits and research, and has trained investigators around the world in mobile forensics. Katie is also a co-author for a white paper on iPhone Forensics, an analysis of the various iPhone Forensics commercial tools.

Ms. Strzempka received her Master’s degree from Purdue University in Cyber Forensics and has a B.S. in Computer and Information Technology. Prior to working for viaForensics, Katie worked for 3 years in Information Security for a Fortune 500 company, handling firewall administration and assisting with internal and external network connectivity.

Table of Contents

  • Acknowledgments
  • Preface
    • Website
  • About the Authors
  • About the Technical Editor
  • Chapter 1. Overview
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • References
  • Chapter 2. Device features and functions
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • References
  • Chapter 3. File system and data storage
    • Publisher Summary
    • Information in this chapter:
    • Introduction
    • Summary
    • References
  • Chapter 4. iPhone and iPad data security
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • References
  • Chapter 5. Acquisitions
    • Publisher Summary
    • Information in this chapter:
    • Introduction
    • Summary
    • References
  • Chapter 6. Data and application analysis
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • References
  • Chapter 7. Commercial tool testing
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • Reference
  • Appendix A. iTunes backup location
  • Appendix B. Tools to analyze common file and data types
  • Appendix C. iPhone file system
  • Index

What People are Saying About This

From the Publisher

A guide to the forensic acquisition and analysis of iPhone and iOS devices, and practical advice on how to secure iOS devices, data and apps.

From the B&N Reads Blog

Customer Reviews