MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn939394639
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160215s2016 enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d N$T  |d VT2  |d DEBBG  |d YDXCP  |d IDEBK  |d OCLCQ  |d COO  |d OCLCF  |d UOK  |d CEF  |d UKMGB  |d WYU  |d AGLDB  |d IGB  |d UKAHL  |d RDF  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB6G3444  |2 bnb 
016 7 |a 018010504  |2 Uk 
019 |a 936628383  |a 936961794 
020 |a 9781785285356  |q electronic bk. 
020 |a 1785285351  |q electronic bk. 
020 |z 9781783988464 
020 |z 1783988460 
029 1 |a DEBBG  |b BV043968884 
029 1 |a DEBSZ  |b 485793962 
029 1 |a GBVCP  |b 882848631 
029 1 |a AU@  |b 000062540041 
029 1 |a UKMGB  |b 018010504 
035 |a (OCoLC)939394639  |z (OCoLC)936628383  |z (OCoLC)936961794 
037 |a CL0500000715  |b Safari Books Online 
050 4 |a QA76.774.I67 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.167  |2 23 
049 |a UAMI 
100 1 |a Birani, Bhanu,  |e author. 
245 1 0 |a iOS forensics cookbook :  |b over 20 recipes that will enable you to handle and extract data from iOS devices for forensics /  |c Bhanu Birani, Mayank Birani. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Quick answers to common problems 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed March 17, 2016) 
500 |a Includes index. 
520 8 |a Annotation  |b Over 20 recipes that will enable you to handle and extract data from iOS devices for forensicsAbout This Book This book gets you straight into solving even the most complex iOS forensic problems with easy-to-understand recipes Get to grips with extraction and analysis techniques to perform forensic investigations on iOS devices Gain insights into how to protect your data and perform data recovery from iOS-based devicesWho This Book Is ForIf you are an iOS application developer who wants to learn about a test flight, hockey app integration, and recovery tools, then this book is for you. This book will be helpful for students learning forensics, as well as experienced iOS developers.What You Will Learn Discover the various ways to save data in the document directory of the device Get to grips with encrypting and decrypting of files saved in the document directories Explore ways to integrate social media with iOS applications Grab the user events and actions on the iOS application using analytic tools Analyze useful information from the data gathered in the cloud Grasp numerous concepts associated with air application distribution Track errors in an application effectively to document them for forensic analysis Read crash reports accumulated on iTunesConnect and decode them to generate and gather useful informationIn DetailMobile device forensics is a branch of digital forensics that involves the recovery of evidence or data in a digital format from a device without affecting its integrity. With the growing popularity of iOS-based Apple devices, iOS forensics has developed immense importance.To cater to the need, this book deals with tasks such as the encryption and decryption of files, various ways to integrate techniques with social media, and ways to grab the user events and actions on the iOS app. Using practical examples, we'll start with the analysis keychain and raw disk decryption, social media integration, and getting accustomed to analytics tools. You'll also learn how to distribute the iOS apps without releasing them to Apple's App Store. Moving on, the book covers test flights and hockey app integration, the crash reporting system, recovery tools, and their features. By the end of the book, using the aforementioned techniques, you will be able to successfully analyze iOS-based devices forensically.Style and approachThis book takes a step-by-step recipe-based approach to iOS forensics and investigation techniques. Topics are explained sequentially in order of complexity, and are accompanied by code and theory that is easy to grasp. 
505 0 |a Cover ; Copyright; Credits; About the Authors; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Saving and Extracting Data; The Documents directory; Saving data using the RAW file; Saving data in the SQLite database; Learning about core data; Chapter 2: Social Media Integration; Integration with Facebook; Integrating with LinkedIn; Integration with Instagram; Chapter 3: Integrating Data Analytics; Introduction; Google Analytics; Flurry Analytics; Flurry with data mining; Integrating Mixpanel; Chapter 4: App Distribution and Crash Reporting; Setting up and integrating TestFlight 
505 8 |a Integrating HockeyAppHockeyApp for crash reporting; Chapter 5: Demystifying Crash Reports; Crashlytics integration; Desymbolication of crash logs; Analyzing crash reports; Chapter 6: Forensics Recovery; DFU and Recovery modes; Extracting and reading data; Recovering backups; Extracting data from iTunes backups; Encrypting and decrypting tools; Chapter 7: Forensics Tools; Exploring iPhone Backup Analyzer; Exploring iExplorer; Exploring SQLite browser; Jailbreaking iPhone devices; Index 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a iOS (Electronic resource) 
630 0 7 |a iOS (Electronic resource)  |2 fast 
650 0 |a Criminal investigation. 
650 0 |a Mobile computing  |x Security measures. 
650 0 |a Cell phone systems  |x Security measures. 
650 0 |a Data recovery (Computer science) 
650 6 |a Enquêtes criminelles. 
650 6 |a Informatique mobile  |x Sécurité  |x Mesures. 
650 6 |a Téléphonie cellulaire  |x Sécurité  |x Mesures. 
650 6 |a Récupération des données (Informatique) 
650 7 |a COMPUTERS / Computer Literacy  |2 bisacsh 
650 7 |a COMPUTERS / Computer Science  |2 bisacsh 
650 7 |a COMPUTERS / Data Processing  |2 bisacsh 
650 7 |a COMPUTERS / Hardware / General  |2 bisacsh 
650 7 |a COMPUTERS / Information Technology  |2 bisacsh 
650 7 |a COMPUTERS / Machine Theory  |2 bisacsh 
650 7 |a COMPUTERS / Reference  |2 bisacsh 
650 7 |a Criminal investigation  |2 fast 
650 7 |a Data recovery (Computer science)  |2 fast 
700 1 |a Birani, Mayank,  |e author. 
830 0 |a Quick answers to common problems. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1163823  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30053550 
938 |a EBSCOhost  |b EBSC  |n 1163823 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis33755766 
938 |a YBP Library Services  |b YANK  |n 12831302 
994 |a 92  |b IZTAP