This book consists of 7 chapters covering device features and functions; file system and data storage; iPhone and iPad data security; acquisitions; data and application analysis; and commercial tool testing.
This book will appeal to forensic investigators (corporate and law enforcement) and incident response professionals.
- Learn techniques to forensically acquire the iPhone, iPad and other iOS devices
- Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers
- In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.