|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn297556550 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090109s2008 caua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d WPG
|d OCLCQ
|d COO
|d CEF
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCQ
|d IDEBK
|d EBLCP
|d YDXCP
|d OCLCQ
|d YT1
|d MERER
|d OCLCQ
|d OCLCF
|d UAB
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 609841493
|a 982681913
|a 1044249516
|a 1056412007
|a 1060975311
|a 1074341489
|
020 |
|
|
|a 9780596153588
|
020 |
|
|
|a 0596153589
|
020 |
|
|
|a 9780596555030
|q (electronic bk.)
|
020 |
|
|
|a 0596555032
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000062567521
|
029 |
1 |
|
|a AU@
|b 000067115027
|
029 |
1 |
|
|a DEBSZ
|b 355419793
|
029 |
1 |
|
|a DEBSZ
|b 430744285
|
029 |
1 |
|
|a HEBIS
|b 29149160X
|
035 |
|
|
|a (OCoLC)297556550
|z (OCoLC)609841493
|z (OCoLC)982681913
|z (OCoLC)1044249516
|z (OCoLC)1056412007
|z (OCoLC)1060975311
|z (OCoLC)1074341489
|
037 |
|
|
|a CL0500000030
|b Safari Books Online
|
050 |
|
4 |
|a TK6570.M6
|b Z396 2008
|
082 |
0 |
4 |
|a 621.38456
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Zdziarski, Jonathan A.
|
245 |
1 |
0 |
|a IPhone forensics :
|b recovering evidence, personal data, and corporate assets /
|c Jonathan Zdziarski.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly Media,
|c 2008.
|
300 |
|
|
|a 1 online resource (xv, 120 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a iPhone Forensics; Preface; Acknowledgments; Organization of the Material; Conventions Used in This Book; Using Code Examples; Legal Disclaimer; Safari® Books Online; We'd Like to Hear from You; 1. Introduction to Computer Forensics; Rules of Evidence; Good Forensic Practices; Document the Evidence; Document All Changes; Establish an Investigation Checklist; Be Detailed; Technical Processes; 2. Understanding the iPhone; Equipment You'll Need; Determining the Firmware Version; Disk Layout; Communication; Upgrading the iPhone Firmware; Restore Mode and Integrity of Evidence.
|
505 |
8 |
|
|a Cross-Contamination and Syncing3. Accessing the iPhone; Windows (iLiberty+ v1.3.0.113); Step 2: Dock the iPhone and Launch iTunes; Step 3: Launch iLiberty+ and Verify Connectivity; Mac OS X; Windows; Step 4: Activate the Forensic Toolkit Payload; Windows; Step 5: Install the Payload; Windows; It's stuck!; What to watch for; Circumventing Passcode Protection (Firmware v1.0.21.1.4); Manual Bypass; Step 2: Enter recovery mode; Step 3: Upload and boot the c.
|
520 |
|
|
|a With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a iPhone (Smartphone)
|
650 |
|
0 |
|a iPod (Digital music player)
|
650 |
|
0 |
|a Cell phone systems
|x Security measures.
|
650 |
|
0 |
|a Mobile computing
|x Security measures.
|
650 |
|
0 |
|a Internet programming.
|
650 |
|
0 |
|a Multimedia systems.
|
650 |
|
6 |
|a iPhone (Téléphone intelligent)
|
650 |
|
6 |
|a iPod (Lecteurs de musique numérique)
|
650 |
|
6 |
|a Téléphonie cellulaire
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Informatique mobile
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Programmation Internet.
|
650 |
|
6 |
|a Multimédia.
|
650 |
|
7 |
|a iPhone (Smartphone)
|2 blmlsh
|
650 |
|
7 |
|a iPod (Digital music player)
|2 blmlsh
|
650 |
|
7 |
|a Cellular telephone systems
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Mobile computing
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Internet programming.
|2 blmlsh
|
650 |
|
7 |
|a Multimedia systems.
|2 blmlsh
|
650 |
|
7 |
|a Internet programming
|2 fast
|
650 |
|
7 |
|a iPhone (Smartphone)
|2 fast
|
650 |
|
7 |
|a iPod (Digital music player)
|2 fast
|
650 |
|
7 |
|a Multimedia systems
|2 fast
|
776 |
1 |
|
|z 9780596153588
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780596153588/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL443523
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28426811
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3179984
|
994 |
|
|
|a 92
|b IZTAP
|