iPhone and iOS Forensics : Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
Material type:
Item type | Current location | Call number | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Electronic Book | UT Tyler Online Online | QA76.8.I64 H665 2011 (Browse shelf) | http://uttyler.eblib.com/patron/FullRecord.aspx?p=716264 | Available | EBL716264 |
Front Cover; iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad, and iOS Devices; Copyright; Contents; Acknowledgments; Preface; About the Authors; About the Technical Editor; Chapter 1: Overview; Introduction; Strategy; Development community; iPhone models; iPhone hardware; Forensic examination approaches; iPhone leveling; Acquisition types; Forensics with Linux; Summary; References; Chapter 2: Device Features and Functions; Introduction; Apple device overview; Operating modes; Normal mode; Recovery mode; DFU mode; Exiting Recovery/DFU mode; Security
Device settingsSecure erase; App security; iTunes interaction; Device synchronization; iPhone backups; iPhone restore; iPhone iOS updates; Upgrade; Downgrade; The App Store; MobileMe; Summary; References; Chapter 3: File system and data storage; Introduction; What data is stored; Where data is stored; How data is stored; Internal storage; SQLite database files; Property lists; Network; Memory types; RAM; NAND Flash; iPhone operating system; iOS layers; File system; Volumes; Journaling; iPhone disk partitions; Summary; References; Chapter 4: iPhone and iPad Data Security; Introduction
Data security and testingComputer crime laws in the United States; Data protection in the hands of the administrators; Security testing procedure; Application security; Corporate or individual mobile app consumers; Corporate or individual mobile app developers; Application security strategies for developers; Recommendations for device and application security; Summary; References; Chapter 5: Acquisitions; Introduction; iPhone forensics overview; Types of investigations; Difference between logical and physical techniques; Modification of the target device; Handling evidence
Passcode proceduresNetwork isolation; Powered-off devices; Imaging an iPhone/iPad; Backup acquisition; Logical acquisition; Physical acquisition; Imaging other apple devices; iPad; iPod Touch; Apple TV; Summary; References; Chapter 6: Data and Application Analysis; Introduction; Analysis techniques; Mount disk image; File carving; Strings; Timeline development and analysis; Forensic analysis; iPhone data storage locations; Default applications; Downloaded apps; Other; iPhone application analysis and reference; Default applications; Third-party (downloaded) applications; Summary; References
Chapter 7: Commercial tool testingIntroduction; Data population; Analysis methodology; Cellebrite UFED; Installation; Forensic acquisition; Results and reporting; iXAM; Installation; Forensic acquisition; Results and reporting; Oxygen forensic suite 2010; Installation; Forensic acquisition; Results and reporting; XRY; Installation; Forensic acquisition; Results and reporting; Lantern; Installation; Forensic acquisition; Results and reporting; MacLock Pick; Installation; Forensic acquisition; Results and reporting; Mobilyze; Installation; Forensic acquisition; Results and reporting
Zdziarski technique
As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. <i>iPhone and iOS Forensics</i> takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators. <br><br><ul><li>Learn techniques to forensically acquire the iPhone, iPad and other iOS device
Description based upon print version of record.
There are no comments on this title.