Versatile iPad forensic acquisition using the Apple Camera Connection Kit
Computers & Mathematics with Applications
The loss of location privacy in the cellular age
Communications of the ACM
Fault isolation and quick recovery in isolation file systems
HotStorage'13 Proceedings of the 5th USENIX conference on Hot Topics in Storage and File Systems
A Study of Linux File System Evolution
ACM Transactions on Storage (TOS)
A study of Linux file system evolution
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Hi-index | 0.02 |
iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With iOS information never published before and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community. What youll learn How to respond to security incidents involving iOS devices How to acquire and analyze data on iOS devices such as iPhone and iPad How to analyze media exploitation on iOS devices Who this book is for Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators. This book can also be employed by law enforcement training academies, universities, as well as computer forensic, information security, and e-discovery communities. Table of Contents History of Apple Mobile Devices iOS Operating and File System Analysis Search, Seizure, and Incident Response iPhone Logical Acquisition Logical Data Analysis Mac and Windows Artifacts GPS Analysis Media Exploitation Media Exploitation Analysis Network Analysis