Computer and Cellphone Security

    iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets

    Posted on February 21, 2018 by Joe Posted in Cellphone Forensics .

    iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets

    Product Description

    “This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!”-Andrew Sheldon, Director of Evidence Talks, computer forensics experts

    With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you:

    • Determine what type of data is stored on the device
    • Break v1.x and v2.x passcode-protected iPhones to gain access to the device
    • Build a custom recovery toolkit for the iPhone
    • Interrupt iPhone 3G’s “secure wipe” process
    • Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition
    • Recover deleted voicemail, images, email, and other personal data, using data carving techniques
    • Recover geotagged metadata from camera photos
    • Discover Google map lookups, typing cache, and other data stored on the live file system
    • Extract contact information from the iPhone’s database
    • Use different recovery strategies based on case needs

    And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.

    Price: $8.87

    • Used Book in Good Condition
    « Social Networks and Popular Understanding of Science and Health: Sharing Disparities
    Walking along the Cambridge side of the Charles River (vertical) »

    Leave a comment

    Leave a comment Cancel reply

    Your email address will not be published. Required fields are marked *

    Pages

    Archives

    • September 2020
    • August 2020
    • July 2020
    • April 2019
    • March 2019
    • February 2019
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018

    Categories

    • Android (3)
    • Cellphone Forensics (397)
    • Computer Forensics (423)
    • Online Safety (579)
    • Online Security (4)
    • Uncategorized (3)

    WordPress

    • Log in
    • WordPress

    Subscribe

    • Entries (RSS)
    • Comments (RSS)

    Pages

    Archives

    • September 2020
    • August 2020
    • July 2020
    • April 2019
    • March 2019
    • February 2019
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018

    Categories

    • Android (3)
    • Cellphone Forensics (397)
    • Computer Forensics (423)
    • Online Safety (579)
    • Online Security (4)
    • Uncategorized (3)

    WordPress

    • Log in
    • WordPress

    CyberChimps WordPress Themes

    © Joe Seanor Security