Unavailable
Unavailable
Unavailable
Ebook412 pages6 hours
Learning iOS Forensics
By Mattia Epifani and Pasquale Stirparo
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
About This Book
- Perform logical, physical, and file system acquisition along with jailbreaking the device
- Get acquainted with various case studies on different forensic toolkits that can be used
- A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS
If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.
Unavailable
Related to Learning iOS Forensics
Related ebooks
iOS Forensics Cookbook Rating: 0 out of 5 stars0 ratingsMastering Mobile Forensics Rating: 0 out of 5 stars0 ratingsiPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices Rating: 4 out of 5 stars4/5Cuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsAndroid Forensics: Investigation, Analysis and Mobile Security for Google Android Rating: 3 out of 5 stars3/5Learning Android Forensics Rating: 4 out of 5 stars4/5Practical Windows Forensics Rating: 0 out of 5 stars0 ratingsWindows Malware Analysis Essentials Rating: 5 out of 5 stars5/5Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations Rating: 0 out of 5 stars0 ratingsCloud Storage Forensics Rating: 4 out of 5 stars4/5Learning iOS Security Rating: 0 out of 5 stars0 ratingsHands-On Network Forensics: Investigate network attacks and find evidence using common network forensic tools Rating: 0 out of 5 stars0 ratingsProfessional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab Rating: 4 out of 5 stars4/5Learning Pentesting for Android Devices Rating: 5 out of 5 stars5/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Rating: 0 out of 5 stars0 ratingsMobile Device Exploitation Cookbook Rating: 0 out of 5 stars0 ratingsLearning Network Forensics Rating: 5 out of 5 stars5/5Learning iOS Penetration Testing Rating: 0 out of 5 stars0 ratingsOperating System Forensics Rating: 4 out of 5 stars4/5Building Virtual Pentesting Labs for Advanced Penetration Testing Rating: 0 out of 5 stars0 ratingsWireshark Network Security Rating: 3 out of 5 stars3/5Mastering Kali Linux for Advanced Penetration Testing - Second Edition Rating: 0 out of 5 stars0 ratingsKali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsMobile Security: How to secure, privatize and recover your devices Rating: 5 out of 5 stars5/5Mastering Python Forensics Rating: 4 out of 5 stars4/5Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity Rating: 0 out of 5 stars0 ratingsLearning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratingsWindows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5
Reviews for Learning iOS Forensics
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews