- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Iphone Forensics: Recovering Evidence, Personal Data, and Corporate Assetsby Jonathan Zdziarski
Synopses & Reviews
"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!"-Andrew Sheldon, Director of Evidence Talks, computer forensics experts
And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.
(From author) With the iPhone quickly becoming the world's #1 mobile device, they are increasingly used for business, and enterprises are finding a need to adequately manage sensitive data. iPhones store an enormous amount of information useful to both security professionals and malicious intruders. Any system administrator responsible for staff who conduct business with the iPhone should know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics gives IT professionals, security professionals, and forensic investigators the knowledge needed to conduct complete and highly specialized forensic analysis of an iPhone or iPod Touch. This book — a must-have for corporate compliance and disaster recovery plans — shows the reader how to recover and extract such information as typing caches, Google map searches, deleted images, email, and other sensitive data retained by the iPhone. The reader will learn the same advanced techniques used by law enforcement, including data carving, evidence preservation, and overriding passcode protection. The materials included in this book have been used by over 200 law enforcement agencies worldwide and are now available for private sector investigators and enlightened geeks.
About the Author
Jonathan Zdziarski is better known as the hacker "NerveGas" in the iPhone development community. His work in cracking the iPhone helped lead the effort to port the first open source applications, and his book, iPhone Open Application Development, taught developers how to write applications for the popular device long before Apple introduced its own SDK. Prior to the release of iPhone Forensics, Jonathan wrote and supported an iPhone forensics manual distributed exclusively to law enforcement. Jonathan frequently consults law enforcement agencies and assists forensic examiners in their investigations. He teaches an iPhone forensics workshop in his spare time to train forensic examiners and corporate security personnel.
Jonathan is also a full-time research scientist specializing in machine learning technology to combat online fraud and spam, an effort that led him to develop networking products capable of learning how to protect customers. He is founder of the DSPAM project, a high-profile, next-generation spam filter that was acquired in 2006 by Sensory Networks, Inc. He lectures widely on the topic of spam and is a foremost researcher in the fields of machine-learning and algorithmic theory.
Jonathan's website is zdziarski.com.
Table of Contents
DedicationForewordPrefaceChapter 1: Introduction to Computer ForensicsChapter 2: Understanding the iPhoneChapter 3: Accessing the iPhoneChapter 4: Forensic RecoveryChapter 5: Electronic DiscoveryChapter 6: Desktop TraceChapter 7: Case HelpDisclosures and Source CodeColophon
What Our Readers Are Saying
Computers and Internet » Computers Reference » General