File Size: 15264 KB
Print Length: 220 pages
Publisher: Packt Publishing (March 10, 2015)
Publication Date: March 10, 2015
Sold by: Digital Services LLC
Language: English
ASIN: B00UJRFGVW
Text-to-Speech: Enabled
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Enabled
Best Sellers Rank: #415,607 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #93 in Books > Computers & Technology > Web Development & Design > User Generated Content #388 in Books > Computers & Technology > Mobile Phones, Tablets & E-Readers > Programming & App Development #1558 in Books > Computers & Technology > Security & Encryption
If you're a digital forensics investigator (which I'm not), or a developer of Apple mobile applications who wants to know how to deal with security issues in Apple devices, I highly recommend reading this book.Although it is aimed at a highly technical audience, any lay person who owns an Apple device should also read it, or try to. It doesn't just discuss security issues, but also describes how data inside Apple devices can be analyzed, and extracted from them.The book is organized, in the authors' own words, "in the order of the main phases of a forensic investigation (identification, acquisition, and analysis)."The first chapter discusses digital and mobile forensics, including the difference between the two. The second chapter introduces Apple devices (iPhones, iPads, iPad minis, and iPod touches), and describes how to identify them. The next two chapters tell how to acquire data from Apple devices, and analyzing data in these devices. Then there are chapters on how to acquire and analyze iTunes backups, and do the same with backups stored in iCloud. Finally, there is chapter on how to assess applications, whether they're malware or not.I really liked how detailed this book was when it described the different types of tools (these include open source, freeware, and commercial software) you can use to do all of the above. At the end of the book, it gives a list of these tools. There is also a section on publications about mobile device forensics.
I found this to be a highly readable technical handbook of iOS forensics. The authors emphasize a hands-on approach, showing not just what information can be extracted but how. The authors go into great detail on the use of many forensic tools both commercial and free. Of special interest are the numerous mini-discussions on the difficulties encountered in attempting forensic extraction and analysis, for instance the impact of Apple’s adoption of encryption in iOS 8 and later.This book can serve as a reference for iOS forensics activities. In addition to direct extraction from devices, there is coverage of the many other potential sources of forensic data including iTunes backups, iCloud and even Google Drive.For those interested in the nitty gritty of iOS forensics or actually in the business, this book provides a comprehensive look at how iOS forensics can be carried out and of the issues that will be encountered along the way.I found it to be enjoyable and thorough. I'd buy it again.
Outstanding Book! The author does a very good job taking the reader through the inner workings of the iOS operating system and its strengths and weaknesses. Whether you are a forensic pro or a novice you can rest assured once you finished reading this book you will have a solid foundation to build on.
A very detailed look into evidence gathering from iOS devices. Merely the descriptions and examples of the tools that exist for this task, and the amount of information that can be retrieved is well worth the price of the book. At each step of the discussion the authors never lose sight of the rules of forensic evidence gathering - it's not enough to get data out, but it must be done in a manner that maintains the information as useful evidence for use in a court of law. The tools and techniques described cover everything from the first iPhone, on up to iOS 8.0. Case studies and examples help to show how to get the information you need, and which tools to best retrieve and interpret it.
Learning: 25 Learning Techniques for Accelerated Learning - Learn Faster by 300%! (Learning, Memory Techniques, Accelerated Learning, Memory, E Learning, ... Learning Techniques, Exam Preparation) Learning iOS Forensics The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Learn: Cognitive Psychology - How to Learn, Any Skill or Subject in 21 Days! (Learn, Learning Disability, Learning Games, Learning Techniques, Learning ... Learning, Cognitive Science, Study) IOS: Crash Course - The Ultimate Beginner's Course to Learning IOS Programming in Under 12 Hours IOS Programming For Beginners: The Simple Guide to Learning IOS Programming Fast! The iOS 5 Developer's Cookbook: Core Concepts and Essential Recipes for iOS Programmers (Developer's Library) iOS 9 Swift Programming Cookbook: Solutions and Examples for iOS Apps Diving Into iOS 9 (iOS App Development for Non-Programmers Book 1) Learn to Code in Swift: The new language of iOS Apps (iOS App Development for Non-Programmers Book 2) Beginning iOS 7 Development: Exploring the iOS SDK iOS 8 Swift Programming Cookbook: Solutions & Examples for iOS Apps SWIFT: PROGRAMMING ESSENTIALS (Bonus Content Included): Learn iOS development! Code and design apps with Apple's New programming language TODAY (iOS development, swift programming) Apps: Mobile App Trends in 2015 (iOS, Xcode Programming, App Development, iOS App Development, App Programming, Swift, Without Coding) ((Android, Android ... App Programming, Rails, Ruby Programming)) Learning OpenGL ES for iOS: A Hands-on Guide to Modern 3D Graphics Programming Learning Swift: Building Apps for OS X and iOS Learning Core Data for iOS with Swift: A Hands-On Guide to Building Core Data Applications Scene of the Cybercrime: Computer Forensics Handbook Computer Forensics JumpStart Computer Forensics: Cybercriminals, Laws, And Evidence