000 03383cam a2200577 i 4500
999 _c93271
_d93271
001 13698651
005 20251013161620.0
006 m o d
007 cr cnu---unuuu
008 220507s2022 enka ob 001 0 eng d
015 _aGBC274206
_2bnb
016 7 _a020566511
_2Uk
020 _a1803242515
020 _a9781803242514
_q(electronic bk.)
020 _z9781803234083
_q(pbk.)
020 _z1803234083
_q(pbk.)
035 9 _a(OCLCCM-CC)1314623659
035 _a(OCoLC)1314623659
037 _a10162501
_bIEEE
040 _aEBLCP
_beng
_erda
_epn
_cEBLCP
_dORMDA
_dEBLCP
_dUKMGB
_dOCLCF
_dOCLCQ
_dN$T
_dUKAHL
_dOCLCQ
_dIEEEE
_dOCLCO
_dFUT
041 _aeng
049 _aMAIN
050 4 _aQA76.774.I67
_bT547 2022
100 1 _aTiepolo, Gianluca,
_eauthor.
245 1 0 _aiOS forensics for investigators :
_btake mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence /
_cGianluca Tiepolo.
264 1 _aBirmingham :
_bPackt Publishing, Limited,
_c2022.
300 _a1 online resource (xvii, 295 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aIntroducing iOS Forensics Data Acquisition from iOS Devices Using Forensic Tools Working with Common iOS Artifacts Pattern-of-Life Forensics Dissecting Location Data Analyzing Connectivity Data Email and Messaging Forensics Photo, Video, and Audio Forensics Analyzing Third-party Apps Locked Devices, iTunes Backups, and iCloud Forensics Writing a Forensic Report and Building a Timeline.
520 _a"Forensic analysts and investigators interested in extending their skills to extract data from iOS devices, including system logs, device usage, and third-party application data, will find this book useful. Anyone familiar with the principles of digital forensics and looking to expand their knowledge base in deep iOS examinations will also benefit from this book.Knowledge of mobile forensic principles, data extraction, Unix/Linux terminal, and some hands-on understanding of databases and SQL query language is assumed."--Provided by publisher
588 _aDescription based on print version record.
630 0 0 _aiOS (Electronic resource)
_0http://id.loc.gov/authorities/names/n2010039603
630 0 7 _aiOS (Electronic resource)
_2fast
650 0 _aCriminal investigation.
_0http://id.loc.gov/authorities/subjects/sh85034045
650 0 _aMobile computing
_xSecurity measures.
650 0 _aCell phone systems
_xSecurity measures.
650 0 _aData recovery (Computer science)
_0http://id.loc.gov/authorities/subjects/sh88005793
650 6 _aEnquêtes criminelles.
650 6 _aInformatique mobile
_xSécurité
_xMesures.
650 6 _aTéléphonie cellulaire
_xSécurité
_xMesures.
650 6 _aRécupération des données (Informatique)
650 7 _aCriminal investigation
_2fast
650 7 _aData recovery (Computer science)
_2fast
655 4 _aElctronic books.
856 4 0 _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=3265380
_yeBooks on EBSCOhost
856 4 0 _uhttps://research.ebsco.com/linkprocessor/plink?id=b338435d-da8a-3f7a-b6cb-c480a2669b77
_yFull text is available at EBSCOHost Click here to view.
942 _2ddc
_cER