New Brain and Whole Body Tissue Clearing|Register Now
»
iPhone and iOS Forensics
 
 

iPhone and iOS Forensics, 1st Edition

Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

 
iPhone and iOS Forensics, 1st Edition,Andrew Hoog,Katie Strzempka,ISBN9781597496599
 
 
 

  &      

Syngress

9781597496599

9781597496605

336

235 X 191

A guide to the forensic acquisition and analysis of iPhone and iOS devices, and practical advice on how to secure iOS devices, data and apps.

Print Book + eBook

USD 83.94
USD 139.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 69.95

eBook
eBook Overview

PDF format

VST format

ePUB format

USD 69.95
Add to Cart
 
 

Key Features

  • Learn techniques to forensically acquire the iPhone, iPad and other iOS devices
  • Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers
  • In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system

Description

As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.

 

Readership

Forensic investigators (corporate and law enforcement) and incident response professionals.

Andrew Hoog

Andrew Hoog is a computer scientist, certified forensic analyst (GCFA and CCE), computer and mobile forensics researcher, former adjunct professor (assembly language) and owner of viaForensics, an innovative computer and mobile forensic firm. He divides his energies between investigations, research and training about the computer and mobile forensic discipline. He writes computer/mobile forensic how-to guides, is interviewed on radio programs and lectures and trains both corporations and law enforcement agencies. As the foremost expert in Android Forensics, he leads expert level training courses, speaks frequently at conferences and is writing a book on Android forensics.

Affiliations and Expertise

is a computer scientist, certified forensic analyst (GCFA and CCE), computer and mobile forensics researcher, former adjunct professor (assembly language) and owner of viaForensics, an innovative computer and mobile forensic firm.

Katie Strzempka

Katie Strzempka is a Technology Consultant with viaForensics, a computer and mobile forensics firm. She performs forensic investigations, security audits and research, and has trained investigators around the world in mobile forensics. Katie is also a co-author for a white paper on iPhone Forensics, an analysis of the various iPhone Forensics commercial tools. Ms. Strzempka received her Master’s degree from Purdue University in Cyber Forensics and has a B.S. in Computer and Information Technology. Prior to working for viaForensics, Katie worked for 3 years in Information Security for a Fortune 500 company, handling firewall administration and assisting with internal and external network connectivity.

Affiliations and Expertise

Technology Consultant with viaForensics. She performs forensic investigations, security audits and research, and has trained investigators around the world in mobile forensics.

iPhone and iOS Forensics, 1st Edition

    Chapter 1. Overview
    Chapter 2. Device features and functions
    Chapter 3. iOS and File System
    Chapter 4. Data Storage
    Chapter 5. Acquisitions
    Chapter 6. Data and Application Analysis
    Chapter 7. Commercial Tool Testing

    Quotes and reviews

    "...a must-have book for those who are professionally engaged in the practice of digital forensics. The book has a wealth of information, and one would not want to be cross-examined as an expert witness without having read this book first." - The Journal of Digital Forensics, Security and Law , Vol. 8, No. 4, 2013

     
     

    Shop with Confidence

    Free Shipping around the world
    ▪ Broad range of products
    ▪ 30 days return policy
    FAQ

    Contact Us