Cargando…

IPhone forensics : recovering evidence, personal data, and corporate assets /

With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Zdziarski, Jonathan A.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, Calif. : O'Reilly Media, 2008.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn297556550
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 090109s2008 caua o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d WPG  |d OCLCQ  |d COO  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d OCLCQ  |d IDEBK  |d EBLCP  |d YDXCP  |d OCLCQ  |d YT1  |d MERER  |d OCLCQ  |d OCLCF  |d UAB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 609841493  |a 982681913  |a 1044249516  |a 1056412007  |a 1060975311  |a 1074341489 
020 |a 9780596153588 
020 |a 0596153589 
020 |a 9780596555030  |q (electronic bk.) 
020 |a 0596555032  |q (electronic bk.) 
029 1 |a AU@  |b 000062567521 
029 1 |a AU@  |b 000067115027 
029 1 |a DEBSZ  |b 355419793 
029 1 |a DEBSZ  |b 430744285 
029 1 |a HEBIS  |b 29149160X 
035 |a (OCoLC)297556550  |z (OCoLC)609841493  |z (OCoLC)982681913  |z (OCoLC)1044249516  |z (OCoLC)1056412007  |z (OCoLC)1060975311  |z (OCoLC)1074341489 
037 |a CL0500000030  |b Safari Books Online 
050 4 |a TK6570.M6  |b Z396 2008 
082 0 4 |a 621.38456  |2 22 
049 |a UAMI 
100 1 |a Zdziarski, Jonathan A. 
245 1 0 |a IPhone forensics :  |b recovering evidence, personal data, and corporate assets /  |c Jonathan Zdziarski. 
250 |a 1st ed. 
260 |a Sebastopol, Calif. :  |b O'Reilly Media,  |c 2008. 
300 |a 1 online resource (xv, 120 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Print version record. 
505 0 |a iPhone Forensics; Preface; Acknowledgments; Organization of the Material; Conventions Used in This Book; Using Code Examples; Legal Disclaimer; Safari® Books Online; We'd Like to Hear from You; 1. Introduction to Computer Forensics; Rules of Evidence; Good Forensic Practices; Document the Evidence; Document All Changes; Establish an Investigation Checklist; Be Detailed; Technical Processes; 2. Understanding the iPhone; Equipment You'll Need; Determining the Firmware Version; Disk Layout; Communication; Upgrading the iPhone Firmware; Restore Mode and Integrity of Evidence. 
505 8 |a Cross-Contamination and Syncing3. Accessing the iPhone; Windows (iLiberty+ v1.3.0.113); Step 2: Dock the iPhone and Launch iTunes; Step 3: Launch iLiberty+ and Verify Connectivity; Mac OS X; Windows; Step 4: Activate the Forensic Toolkit Payload; Windows; Step 5: Install the Payload; Windows; It's stuck!; What to watch for; Circumventing Passcode Protection (Firmware v1.0.21.1.4); Manual Bypass; Step 2: Enter recovery mode; Step 3: Upload and boot the c. 
520 |a With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a iPhone (Smartphone) 
650 0 |a iPod (Digital music player) 
650 0 |a Cell phone systems  |x Security measures. 
650 0 |a Mobile computing  |x Security measures. 
650 0 |a Internet programming. 
650 0 |a Multimedia systems. 
650 6 |a iPhone (Téléphone intelligent) 
650 6 |a iPod (Lecteurs de musique numérique) 
650 6 |a Téléphonie cellulaire  |x Sécurité  |x Mesures. 
650 6 |a Informatique mobile  |x Sécurité  |x Mesures. 
650 6 |a Programmation Internet. 
650 6 |a Multimédia. 
650 7 |a iPhone (Smartphone)  |2 blmlsh 
650 7 |a iPod (Digital music player)  |2 blmlsh 
650 7 |a Cellular telephone systems  |x Security measures.  |2 blmlsh 
650 7 |a Mobile computing  |x Security measures.  |2 blmlsh 
650 7 |a Internet programming.  |2 blmlsh 
650 7 |a Multimedia systems.  |2 blmlsh 
650 7 |a Internet programming  |2 fast 
650 7 |a iPhone (Smartphone)  |2 fast 
650 7 |a iPod (Digital music player)  |2 fast 
650 7 |a Multimedia systems  |2 fast 
776 1 |z 9780596153588 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780596153588/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL443523 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28426811 
938 |a YBP Library Services  |b YANK  |n 3179984 
994 |a 92  |b IZTAP