+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

iPhone and iOS Forensics. Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

  • Book

  • July 2011
  • Elsevier Science and Technology
  • ID: 1767121

iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner, so that all of the methods and procedures outlined in the text can be taken into any courtroom. It includes information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.

This book consists of 7 chapters covering device features and functions; file system and data storage; iPhone and iPad data security; acquisitions; data and application analysis; and commercial tool testing.

This book will appeal to forensic investigators (corporate and law enforcement) and incident response professionals.

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Table of Contents

  • Acknowledgments
  • Preface
    • Website
  • About the Authors
  • About the Technical Editor
  • Chapter 1. Overview
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • References
  • Chapter 2. Device features and functions
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • References
  • Chapter 3. File system and data storage
    • Publisher Summary
    • Information in this chapter:
    • Introduction
    • Summary
    • References
  • Chapter 4. iPhone and iPad data security
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • References
  • Chapter 5. Acquisitions
    • Publisher Summary
    • Information in this chapter:
    • Introduction
    • Summary
    • References
  • Chapter 6. Data and application analysis
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • References
  • Chapter 7. Commercial tool testing
    • Publisher Summary
    • Chapter points:
    • Introduction
    • Summary
    • Reference
  • Appendix A. iTunes backup location
  • Appendix B. Tools to analyze common file and data types
  • Appendix C. iPhone file system
  • Index

Authors

Andrew Hoog Former adjunct professor (assembly language) and owner of viaForensics.

Andrew Hoog is a computer scientist, certified forensic analyst (GCFA and CCE), computer and mobile forensics researcher, former adjunct professor (assembly language) and owner of viaForensics, an innovative computer and mobile forensic firm. He divides his energies between investigations, research and training about the computer and mobile forensic discipline. He writes computer/mobile forensic how-to guides, is interviewed on radio programs and lectures and trains both corporations and law enforcement agencies. As the foremost expert in Android Forensics, he leads expert level training courses, speaks frequently at conferences and is writing a book on Android forensics.
Katie Strzempka Technology Consultant with viaForensics.

Katie Strzempka is a Technology Consultant with viaForensics, a computer and mobile forensics firm. She performs forensic investigations, security audits and research, and has trained investigators around the world in mobile forensics. Katie is also a co-author for a white paper on iPhone Forensics, an analysis of the various iPhone Forensics commercial tools.

Ms. Strzempka received her Master's degree from Purdue University in Cyber Forensics and has a B.S. in Computer and Information Technology. Prior to working for viaForensics, Katie worked for 3 years in Information Security for a Fortune 500 company, handling firewall administration and assisting with internal and external network connectivity.