| 000 | 03383cam a2200577 i 4500 | ||
|---|---|---|---|
| 999 |
_c93271 _d93271 |
||
| 001 | 13698651 | ||
| 005 | 20251013161620.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 220507s2022 enka ob 001 0 eng d | ||
| 015 |
_aGBC274206 _2bnb |
||
| 016 | 7 |
_a020566511 _2Uk |
|
| 020 | _a1803242515 | ||
| 020 |
_a9781803242514 _q(electronic bk.) |
||
| 020 |
_z9781803234083 _q(pbk.) |
||
| 020 |
_z1803234083 _q(pbk.) |
||
| 035 | 9 | _a(OCLCCM-CC)1314623659 | |
| 035 | _a(OCoLC)1314623659 | ||
| 037 |
_a10162501 _bIEEE |
||
| 040 |
_aEBLCP _beng _erda _epn _cEBLCP _dORMDA _dEBLCP _dUKMGB _dOCLCF _dOCLCQ _dN$T _dUKAHL _dOCLCQ _dIEEEE _dOCLCO _dFUT |
||
| 041 | _aeng | ||
| 049 | _aMAIN | ||
| 050 | 4 |
_aQA76.774.I67 _bT547 2022 |
|
| 100 | 1 |
_aTiepolo, Gianluca, _eauthor. |
|
| 245 | 1 | 0 |
_aiOS forensics for investigators : _btake mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / _cGianluca Tiepolo. |
| 264 | 1 |
_aBirmingham : _bPackt Publishing, Limited, _c2022. |
|
| 300 |
_a1 online resource (xvii, 295 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aIntroducing iOS Forensics Data Acquisition from iOS Devices Using Forensic Tools Working with Common iOS Artifacts Pattern-of-Life Forensics Dissecting Location Data Analyzing Connectivity Data Email and Messaging Forensics Photo, Video, and Audio Forensics Analyzing Third-party Apps Locked Devices, iTunes Backups, and iCloud Forensics Writing a Forensic Report and Building a Timeline. | |
| 520 | _a"Forensic analysts and investigators interested in extending their skills to extract data from iOS devices, including system logs, device usage, and third-party application data, will find this book useful. Anyone familiar with the principles of digital forensics and looking to expand their knowledge base in deep iOS examinations will also benefit from this book.Knowledge of mobile forensic principles, data extraction, Unix/Linux terminal, and some hands-on understanding of databases and SQL query language is assumed."--Provided by publisher | ||
| 588 | _aDescription based on print version record. | ||
| 630 | 0 | 0 |
_aiOS (Electronic resource) _0http://id.loc.gov/authorities/names/n2010039603 |
| 630 | 0 | 7 |
_aiOS (Electronic resource) _2fast |
| 650 | 0 |
_aCriminal investigation. _0http://id.loc.gov/authorities/subjects/sh85034045 |
|
| 650 | 0 |
_aMobile computing _xSecurity measures. |
|
| 650 | 0 |
_aCell phone systems _xSecurity measures. |
|
| 650 | 0 |
_aData recovery (Computer science) _0http://id.loc.gov/authorities/subjects/sh88005793 |
|
| 650 | 6 | _aEnquêtes criminelles. | |
| 650 | 6 |
_aInformatique mobile _xSécurité _xMesures. |
|
| 650 | 6 |
_aTéléphonie cellulaire _xSécurité _xMesures. |
|
| 650 | 6 | _aRécupération des données (Informatique) | |
| 650 | 7 |
_aCriminal investigation _2fast |
|
| 650 | 7 |
_aData recovery (Computer science) _2fast |
|
| 655 | 4 | _aElctronic books. | |
| 856 | 4 | 0 |
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=3265380 _yeBooks on EBSCOhost |
| 856 | 4 | 0 |
_uhttps://research.ebsco.com/linkprocessor/plink?id=b338435d-da8a-3f7a-b6cb-c480a2669b77 _yFull text is available at EBSCOHost Click here to view. |
| 942 |
_2ddc _cER |
||