did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780596153588

iPhone Forensics

by
  • ISBN13:

    9780596153588

  • ISBN10:

    0596153589

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2008-09-01
  • Publisher: Oreilly & Associates Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $39.99 Save up to $4.00
  • Buy New
    $38.79
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-3 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

With the iPhone quickly becoming the world's Number 1 mobile device, they are increasingly used for business, and enterprises are finding a need to adequately manage sensitive data. iPhones store an enormous amount of information useful to both security professionals and malicious intruders. Any system administrator responsible for staff who conduct business with the iPhone should know how to recover, analyze, and securely destroy sensitive data. "iPhone Forensics" gives IT professionals, security professionals, and forensic investigators the knowledge needed to conduct complete and highly specialized forensic analysis of an iPhone or iPod Touch.

Author Biography

Jonathan Zdziarski is better known as the hacker "NerveGas" in the iPhone development community. His work in cracking the iPhone helped lead the effort to port the first open source applications, and his book, iPhone Open Application Development, taught developers how to write applications for the popular device long before Apple introduced its own SDK. Prior to the release of iPhone Forensics, Jonathan wrote and supported an iPhone forensics manual distributed exclusively to law enforcement. Jonathan frequently consults law enforcement agencies and assists forensic examiners in their investigations. He teaches an iPhone forensics workshop in his spare time to train forensic examiners and corporate security personnel.

Jonathan is also a full-time research scientist specializing in machine learning technology to combat online fraud and spam, an effort that led him to develop networking products capable of learning how to protect customers. He is founder of the DSPAM project, a high-profile, next-generation spam filter that was acquired in 2006 by Sensory Networks, Inc. He lectures widely on the topic of spam and is a foremost researcher in the fields of machine-learning and algorithmic theory.

Jonathan's website is zdziarski.com.

Table of Contents

Forewordp. ix
Prefacep. xi
Introduction to Computer Forensicsp. 1
Making Your Search Legalp. 1
Rules of Evidencep. 2
Good Forensic Practicesp. 3
Technical Processesp. 5
Understanding the iPhonep. 7
What's Storedp. 8
Equipment You'll Needp. 10
Determining the Firmware Versionp. 10
Disk Layoutp. 11
Communicationp. 12
Upgrading the iPhone Firmwarep. 13
Restore Mode and Integrity of Evidencep. 14
Cross-Contamination and Syncingp. 15
Accessing the iPhonep. 19
Installing the Recovery Toolkit (Firmware v1.0.2-1.1.4)p. 19
Circumventing Passcode Protection (Firmware v1.0.2-1.1.4)p. 26
Installing the Recovery Toolkit (Firmware v2.x)p. 30
Removing the Forensic Recovery/Toolkitp. 42
Forensic Recoveryp. 43
Configuring Wi-Fi and SSHp. 43
Recovering the Media Partitionp. 47
Data Carving Using Foremost/Scalpelp. 55
Validating Images with ImageMagickp. 61
Strings Dumpp. 62
The Takeawayp. 63
Electronic Discoveryp. 65
Converting Timestampsp. 65
Mounting the Disk Imagep. 66
Graphical File Navigationp. 67
Extracting Image Geotags with Exifprobep. 69
SQLite Databasesp. 70
Important Database Filesp. 72
Property Listsp. 81
Other Important Filesp. 85
Desktop Tracep. 87
Proving Trusted Pairing Relationshipsp. 88
Serial Number Recordsp. 91
Device Backupsp. 92
Activation Recordsp. 93
Case Helpp. 97
Employee Suspected of Inappropriate Communicationp. 97
Employee Destroyed Important Datap. 100
Seized iPhone: Whose Is It and Where Is He?p. 101
Disclosures and Source Codep. 105
Indexp. 115
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program