Apress

iOS Forensic Analysis

for iPhone, iPad, and iPod touch

By Sean Morrissey

iOS Forensic Analysis Cover Image

iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod touch, and iPad devices.

Full Description

  • ISBN13: 978-1-4302-3342-8
  • 372 Pages
  • User Level: Beginner to Intermediate
  • Publication Date: December 20, 2010
  • Available eBook Formats: EPUB, MOBI, PDF
  • Print Book Price: $64.99
  • eBook Price: $45.99
Buy eBook Buy Print Book Add to Wishlist

Related Titles

Full Description

iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community.

What you’ll learn

  • How to respond to security incidents involving iOS devices
  • How to acquire and analyze data on iOS devices such as iPhone and iPad
  • How to analyze media exploitation on iOS devices

Who this book is for

Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators.

This book can also be employed by law enforcement training academies and universities, as well as computer forensics, information security, and e-discovery communities.

Table of Contents

Table of Contents

  1. History of Apple Mobile Devices
  2. iOS Operating and File System Analysis
  3. Search, Seizure, and Incident Response
  4. iPhone Logical Acquisition
  5. Logical Data Analysis
  6. Mac and Windows Artifacts
  7. GPS Analysis
  8. Media Exploitation
  9. Media Exploitation Analysis
  10. Network Analysis
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

On page 42:

Table 2-1 is incomplete. For example, "Tmp; has a symbolic link to" is a complete entry. There are a couple of rows like that.