- Tapa blanda: 336 páginas
- Editor: Syngress (16 de junio de 2011)
- Idioma: Inglés
- ISBN-10: 1597496596
- ISBN-13: 978-1597496599
- Valoración media de los clientes: Sé el primero en opinar sobre este producto
Clasificación en los más vendidos de Amazon:
nº1.048.895 en Libros en idiomas extranjeros (Ver el Top 100 en Libros en idiomas extranjeros)
- n.° 2638 en Libros en idiomas extranjeros > Informática, internet y medios digitales > Seguridad informática
- n.° 3390 en Libros en idiomas extranjeros > Informática, internet y medios digitales > Bases de datos
- n.° 6039 en Libros en idiomas extranjeros > Sociedad y ciencias sociales > Servicios sociales y bienestar social
- Ver el Índice completo
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices (Inglés) Tapa blanda – 16 jun 2011
|Nuevo desde||Usado desde|
Descripción del producto
"...a must-have book for those who are professionally engaged in the practice of digital forensics. The book has a wealth of information, and one would not want to be cross-examined as an expert witness without having read this book first."--The Journal of Digital Forensics, Security and Law ,Vol. 8, No. 4, 2013
Reseña del editor
iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner, so that all of the methods and procedures outlined in the text can be taken into any courtroom. It includes information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.
This book consists of 7 chapters covering device features and functions; file system and data storage; iPhone and iPad data security; acquisitions; data and application analysis; and commercial tool testing.
This book will appeal to forensic investigators (corporate and law enforcement) and incident response professionals.
- Learn techniques to forensically acquire the iPhone, iPad and other iOS devices
- Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers
- In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system
No es necesario ningún dispositivo Kindle. Descárgate una de las apps de Kindle gratuitas para comenzar a leer libros Kindle en tu smartphone, tablet u ordenador.
Obtén la app gratuita:
Detalles del producto
Si eres el vendedor de este producto, ¿te gustaría sugerir ciertos cambios a través del servicio de atención al vendedor?
Opiniones de clientes
|5 estrellas (0%)|
|4 estrellas (0%)|
|3 estrellas (0%)|
|2 estrellas (0%)|
|1 estrella (0%)|
Opiniones de clientes más útiles en Amazon.com
The book is roughly three hundred pages without the index and ten pages of that are the Appendix A through C. Unlike other books the appendixes are extremely useful. Many times they are a collection of garbage to add pages, but these are quick reference pages for backup locations, useful tools for forensic investigation of iOS, and the system file structure of an iPhone. Which version the structure references I'm not sure, but most likely whatever was the latest at time of writing.
Of the content there were seven total chapters. I found all the chapters extremely helpful with the exception of the largest chapter. Chapter seven was a review of commercial tools available for forensic analysis of an iOS device. While this chapter was somewhat helpful it was a lot of repetitive data that I am not going to apply to use in most day to day forensic analysis cases.
While chapters one through four had very little in the way of forensics they were actually the most useful chapters in my opinion. The first chapter focused the basics of iphone, models, hardware etc.. and then went into the theory of mobile forensics and how to apply it to the rest of the book
Chapter two covered all the basic information that a forensic examiner may or may not already know and how these basic steps that many examiners might take for granted would apply to a potential investigation.
Chapter three covered the basic filesystem and structure of the iOS operating system. While it was basically a *nix based system this chapter goes over the basic differences in them.
Chapter four goes over the basic security that Apple has built into the iOS device. Covering the differences in the pin on the device and applying a password into a backup that is acquired through iTunes.
Chapter five cover acquiring and image of forensic data off of the device. My only disappointment was the lack of a real opensource option other than jailbreaking. While this is not a fault of the book a reader should not expect a "cheap" option other than jailbreaking. It does cover using a backup, but this does not give you access to the system files. So if you only need user data you should feel comfortable with this portion. If however you are required to examine the device for malicious software jailbreaking will be the only option that does not require payment and NDA.
Chapter six covers actually examining and analyzing the data that had been received in the previous chapter.
While overall this book is excellent as a source for forensic analysis of an iOS device there is very little to compare it to. Not taking anything away from this book, it is by far an excellent source of information and if you ever believe you may have to examine an Apple device I would recommend you have a copy of this book on your shelf.