Skip to content

Learning iOS Forensics - Second Edition, Paperback, 2nd Revised edition by Epifani, Mattia

Sold Out
$1.20

Paperback: 2nd Revised edition
Brand New
9781785882081
1785882082

Publication Date: 2016-09-30
Paperback : 330 pages
Edition: 2nd Revised edition
Author: Epifani, Mattia
ISBN-10: 1785882082
ISBN-13: 9781785882081

Product Description A practical guide to analyzing iOS devices with the latest forensics tools and techniquesAbout This BookThis book is a comprehensive update to Learning iOS ForensicsThis practical book will not only cover the critical aspects of digital forensics, but also mobile forensicsWhether you’re a forensic analyst or an iOS developer, there’s something in this book for youThe authors, Mattia Epifani and Pasquale Stirparo, are respected members of the community, they go into extensive detail to cover critical topicsWho This Book Is ForThe book is for digital forensics analysts, incident response analysts, IT security experts, and malware analysts. It would be beneficial if you have basic knowledge of forensicsWhat You Will LearnIdentify an iOS device between various models (iPhone, iPad, iPod Touch) and verify the iOS version installedCrack or bypass the protection passcode chosen by the userAcquire, at the most detailed level, the content of an iOS Device (physical, advanced logical, or logical)Recover information from a local backup and eventually crack the backup passwordDownload back-up information stored on iCloudAnalyze system, user, and third-party information from a device, a backup, or iCloudExamine malicious apps to identify data and credential theftsIn DetailMobile forensics is used within many different domains, but is chiefly employed in the field of information security. By understanding common attack vectors and vulnerability points, security professionals can develop measures and examine system architectures to harden security on iOS devices. This book is a complete manual on the identification, acquisition, and analysis of iOS devices, updated to iOS 8 and 9.You will learn by doing, with various case studies. The book covers different devices, operating system, and apps. There is a completely renewed section on third-party apps with a detailed analysis of the most interesting artifacts. By investigating compromised devices, you can work out the identity of the attacker, as well as what was taken, when, why, where, and how the attack was conducted. Also you will learn in detail about data security and application security that can assist forensics investigators and application developers. It will take hands-on approach to solve complex problems of digital forensics as well as mobile forensics.Style and approachThis book provides a step-by-step approach that will guide you through one topic at a time.This intuitive guide focuses on one key topic at a time. Building upon the acquired knowledge in each chapter, we will connect the fundamental theory and practical tips by illustrative visualizations and hands-on code examples. About the Author Mattia Epifani (@mattiaep) is the CEO at Reality Net-System Solutions, an Italian consulting company involved in InfoSec and digital forensics.He works as a digital forensics analyst for judges, prosecutors, lawyers, and private companies. He is a court witness and digital forensics expert.He obtained a university degree in computer science in Genoa, Italy, and a master's degree in computer forensics and digital investigations in Milan, Italy. Over the last few years, he obtained several certifications in digital forensics and ethical hacking (GCFA, GREM, GNFA, GMOB, CIFI, CEH, CHFI, ACE, AME, ECCE, CCE, and MPSC) and attended several SANS classes (computer forensics and incident response, Windows memory forensics, mobile device security and ethical hacking, reverse engineering malware, smartphone forensics, and network forensics analysis).He speaks regularly on digital forensics in various Italian and European universities (Genova, Milano, Roma, Bolzano, Pescara, Salerno, Campobasso, Camerino, Pavia, Savona, Catania, Lugano, Como, and Modena e Reggio Emilia) and events (DFRWS, SANS European Digital Forensics Summit, Security Summit, IISFA Forum, DEFT Conference, and DFA Open Day).He is a member of CLUSIT, DFA, IISFA, ONIF, and Tech and Law Center, and the author


Books >> Subjects >> Computers & Technology >> Programming