iOS forensics cookbook :: over 20 recipes that will enable you to handle and extract data from iOS devices for forensics /
Annotation
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2016.
|
Schriftenreihe: | Quick answers to common problems.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource : illustrations. |
ISBN: | 9781785285356 1785285351 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn939394639 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 160215s2016 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d N$T |d VT2 |d DEBBG |d YDXCP |d IDEBK |d OCLCQ |d COO |d OCLCF |d UOK |d CEF |d UKMGB |d WYU |d AGLDB |d IGB |d UKAHL |d RDF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d TMA |d OCLCQ | ||
015 | |a GBB6G3444 |2 bnb | ||
016 | 7 | |a 018010504 |2 Uk | |
019 | |a 936628383 |a 936961794 | ||
020 | |a 9781785285356 |q electronic bk. | ||
020 | |a 1785285351 |q electronic bk. | ||
020 | |z 9781783988464 | ||
020 | |z 1783988460 | ||
035 | |a (OCoLC)939394639 |z (OCoLC)936628383 |z (OCoLC)936961794 | ||
037 | |a CL0500000715 |b Safari Books Online | ||
050 | 4 | |a QA76.774.I67 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.167 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Birani, Bhanu, |e author. | |
245 | 1 | 0 | |a iOS forensics cookbook : |b over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / |c Bhanu Birani, Mayank Birani. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2016. | |
300 | |a 1 online resource : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Quick answers to common problems | |
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed March 17, 2016) | |
500 | |a Includes index. | ||
520 | 8 | |a Annotation |b Over 20 recipes that will enable you to handle and extract data from iOS devices for forensicsAbout This Book This book gets you straight into solving even the most complex iOS forensic problems with easy-to-understand recipes Get to grips with extraction and analysis techniques to perform forensic investigations on iOS devices Gain insights into how to protect your data and perform data recovery from iOS-based devicesWho This Book Is ForIf you are an iOS application developer who wants to learn about a test flight, hockey app integration, and recovery tools, then this book is for you. This book will be helpful for students learning forensics, as well as experienced iOS developers.What You Will Learn Discover the various ways to save data in the document directory of the device Get to grips with encrypting and decrypting of files saved in the document directories Explore ways to integrate social media with iOS applications Grab the user events and actions on the iOS application using analytic tools Analyze useful information from the data gathered in the cloud Grasp numerous concepts associated with air application distribution Track errors in an application effectively to document them for forensic analysis Read crash reports accumulated on iTunesConnect and decode them to generate and gather useful informationIn DetailMobile device forensics is a branch of digital forensics that involves the recovery of evidence or data in a digital format from a device without affecting its integrity. With the growing popularity of iOS-based Apple devices, iOS forensics has developed immense importance.To cater to the need, this book deals with tasks such as the encryption and decryption of files, various ways to integrate techniques with social media, and ways to grab the user events and actions on the iOS app. Using practical examples, we'll start with the analysis keychain and raw disk decryption, social media integration, and getting accustomed to analytics tools. You'll also learn how to distribute the iOS apps without releasing them to Apple's App Store. Moving on, the book covers test flights and hockey app integration, the crash reporting system, recovery tools, and their features. By the end of the book, using the aforementioned techniques, you will be able to successfully analyze iOS-based devices forensically.Style and approachThis book takes a step-by-step recipe-based approach to iOS forensics and investigation techniques. Topics are explained sequentially in order of complexity, and are accompanied by code and theory that is easy to grasp. | |
505 | 0 | |a Cover ; Copyright; Credits; About the Authors; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Saving and Extracting Data; The Documents directory; Saving data using the RAW file; Saving data in the SQLite database; Learning about core data; Chapter 2: Social Media Integration; Integration with Facebook; Integrating with LinkedIn; Integration with Instagram; Chapter 3: Integrating Data Analytics; Introduction; Google Analytics; Flurry Analytics; Flurry with data mining; Integrating Mixpanel; Chapter 4: App Distribution and Crash Reporting; Setting up and integrating TestFlight | |
505 | 8 | |a Integrating HockeyAppHockeyApp for crash reporting; Chapter 5: Demystifying Crash Reports; Crashlytics integration; Desymbolication of crash logs; Analyzing crash reports; Chapter 6: Forensics Recovery; DFU and Recovery modes; Extracting and reading data; Recovering backups; Extracting data from iTunes backups; Encrypting and decrypting tools; Chapter 7: Forensics Tools; Exploring iPhone Backup Analyzer; Exploring iExplorer; Exploring SQLite browser; Jailbreaking iPhone devices; Index | |
630 | 0 | 0 | |a iOS (Electronic resource) |0 http://id.loc.gov/authorities/names/n2010039603 |
630 | 0 | 7 | |a iOS (Electronic resource) |2 fast |
650 | 0 | |a Criminal investigation. |0 http://id.loc.gov/authorities/subjects/sh85034045 | |
650 | 0 | |a Mobile computing |x Security measures. | |
650 | 0 | |a Cell phone systems |x Security measures. | |
650 | 0 | |a Data recovery (Computer science) |0 http://id.loc.gov/authorities/subjects/sh88005793 | |
650 | 6 | |a Enquêtes criminelles. | |
650 | 6 | |a Informatique mobile |x Sécurité |x Mesures. | |
650 | 6 | |a Téléphonie cellulaire |x Sécurité |x Mesures. | |
650 | 6 | |a Récupération des données (Informatique) | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Criminal investigation |2 fast | |
650 | 7 | |a Data recovery (Computer science) |2 fast | |
700 | 1 | |a Birani, Mayank, |e author. | |
758 | |i has work: |a IOS forensics cookbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3MJ7b8y3mq4wH73KBkCcP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
830 | 0 | |a Quick answers to common problems. |0 http://id.loc.gov/authorities/names/no2015091434 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1163823 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH30053550 | ||
938 | |a EBSCOhost |b EBSC |n 1163823 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis33755766 | ||
938 | |a YBP Library Services |b YANK |n 12831302 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn939394639 |
---|---|
_version_ | 1816882339696869376 |
adam_text | |
any_adam_object | |
author | Birani, Bhanu Birani, Mayank |
author_facet | Birani, Bhanu Birani, Mayank |
author_role | aut aut |
author_sort | Birani, Bhanu |
author_variant | b b bb m b mb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.774.I67 |
callnumber-search | QA76.774.I67 |
callnumber-sort | QA 276.774 I67 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover ; Copyright; Credits; About the Authors; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Saving and Extracting Data; The Documents directory; Saving data using the RAW file; Saving data in the SQLite database; Learning about core data; Chapter 2: Social Media Integration; Integration with Facebook; Integrating with LinkedIn; Integration with Instagram; Chapter 3: Integrating Data Analytics; Introduction; Google Analytics; Flurry Analytics; Flurry with data mining; Integrating Mixpanel; Chapter 4: App Distribution and Crash Reporting; Setting up and integrating TestFlight Integrating HockeyAppHockeyApp for crash reporting; Chapter 5: Demystifying Crash Reports; Crashlytics integration; Desymbolication of crash logs; Analyzing crash reports; Chapter 6: Forensics Recovery; DFU and Recovery modes; Extracting and reading data; Recovering backups; Extracting data from iTunes backups; Encrypting and decrypting tools; Chapter 7: Forensics Tools; Exploring iPhone Backup Analyzer; Exploring iExplorer; Exploring SQLite browser; Jailbreaking iPhone devices; Index |
ctrlnum | (OCoLC)939394639 |
dewey-full | 004.167 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.167 |
dewey-search | 004.167 |
dewey-sort | 14.167 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07254cam a2200829 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn939394639</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">160215s2016 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">N$T</subfield><subfield code="d">VT2</subfield><subfield code="d">DEBBG</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">UOK</subfield><subfield code="d">CEF</subfield><subfield code="d">UKMGB</subfield><subfield code="d">WYU</subfield><subfield code="d">AGLDB</subfield><subfield code="d">IGB</subfield><subfield code="d">UKAHL</subfield><subfield code="d">RDF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6G3444</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018010504</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">936628383</subfield><subfield code="a">936961794</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785285356</subfield><subfield code="q">electronic bk.</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1785285351</subfield><subfield code="q">electronic bk.</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781783988464</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1783988460</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)939394639</subfield><subfield code="z">(OCoLC)936628383</subfield><subfield code="z">(OCoLC)936961794</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000715</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.774.I67</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.167</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Birani, Bhanu,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">iOS forensics cookbook :</subfield><subfield code="b">over 20 recipes that will enable you to handle and extract data from iOS devices for forensics /</subfield><subfield code="c">Bhanu Birani, Mayank Birani.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Quick answers to common problems</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed March 17, 2016)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">Over 20 recipes that will enable you to handle and extract data from iOS devices for forensicsAbout This Book This book gets you straight into solving even the most complex iOS forensic problems with easy-to-understand recipes Get to grips with extraction and analysis techniques to perform forensic investigations on iOS devices Gain insights into how to protect your data and perform data recovery from iOS-based devicesWho This Book Is ForIf you are an iOS application developer who wants to learn about a test flight, hockey app integration, and recovery tools, then this book is for you. This book will be helpful for students learning forensics, as well as experienced iOS developers.What You Will Learn Discover the various ways to save data in the document directory of the device Get to grips with encrypting and decrypting of files saved in the document directories Explore ways to integrate social media with iOS applications Grab the user events and actions on the iOS application using analytic tools Analyze useful information from the data gathered in the cloud Grasp numerous concepts associated with air application distribution Track errors in an application effectively to document them for forensic analysis Read crash reports accumulated on iTunesConnect and decode them to generate and gather useful informationIn DetailMobile device forensics is a branch of digital forensics that involves the recovery of evidence or data in a digital format from a device without affecting its integrity. With the growing popularity of iOS-based Apple devices, iOS forensics has developed immense importance.To cater to the need, this book deals with tasks such as the encryption and decryption of files, various ways to integrate techniques with social media, and ways to grab the user events and actions on the iOS app. Using practical examples, we'll start with the analysis keychain and raw disk decryption, social media integration, and getting accustomed to analytics tools. You'll also learn how to distribute the iOS apps without releasing them to Apple's App Store. Moving on, the book covers test flights and hockey app integration, the crash reporting system, recovery tools, and their features. By the end of the book, using the aforementioned techniques, you will be able to successfully analyze iOS-based devices forensically.Style and approachThis book takes a step-by-step recipe-based approach to iOS forensics and investigation techniques. Topics are explained sequentially in order of complexity, and are accompanied by code and theory that is easy to grasp.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover ; Copyright; Credits; About the Authors; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Saving and Extracting Data; The Documents directory; Saving data using the RAW file; Saving data in the SQLite database; Learning about core data; Chapter 2: Social Media Integration; Integration with Facebook; Integrating with LinkedIn; Integration with Instagram; Chapter 3: Integrating Data Analytics; Introduction; Google Analytics; Flurry Analytics; Flurry with data mining; Integrating Mixpanel; Chapter 4: App Distribution and Crash Reporting; Setting up and integrating TestFlight</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Integrating HockeyAppHockeyApp for crash reporting; Chapter 5: Demystifying Crash Reports; Crashlytics integration; Desymbolication of crash logs; Analyzing crash reports; Chapter 6: Forensics Recovery; DFU and Recovery modes; Extracting and reading data; Recovering backups; Extracting data from iTunes backups; Encrypting and decrypting tools; Chapter 7: Forensics Tools; Exploring iPhone Backup Analyzer; Exploring iExplorer; Exploring SQLite browser; Jailbreaking iPhone devices; Index</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">iOS (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2010039603</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">iOS (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034045</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cell phone systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data recovery (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh88005793</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Enquêtes criminelles.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Informatique mobile</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Téléphonie cellulaire</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Récupération des données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data recovery (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Birani, Mayank,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">IOS forensics cookbook (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3MJ7b8y3mq4wH73KBkCcP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Quick answers to common problems.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091434</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1163823</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH30053550</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1163823</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis33755766</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12831302</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn939394639 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:03Z |
institution | BVB |
isbn | 9781785285356 1785285351 |
language | English |
oclc_num | 939394639 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Packt Publishing, |
record_format | marc |
series | Quick answers to common problems. |
series2 | Quick answers to common problems |
spelling | Birani, Bhanu, author. iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / Bhanu Birani, Mayank Birani. Birmingham, UK : Packt Publishing, 2016. 1 online resource : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier Quick answers to common problems Online resource; title from PDF title page (EBSCO, viewed March 17, 2016) Includes index. Annotation Over 20 recipes that will enable you to handle and extract data from iOS devices for forensicsAbout This Book This book gets you straight into solving even the most complex iOS forensic problems with easy-to-understand recipes Get to grips with extraction and analysis techniques to perform forensic investigations on iOS devices Gain insights into how to protect your data and perform data recovery from iOS-based devicesWho This Book Is ForIf you are an iOS application developer who wants to learn about a test flight, hockey app integration, and recovery tools, then this book is for you. This book will be helpful for students learning forensics, as well as experienced iOS developers.What You Will Learn Discover the various ways to save data in the document directory of the device Get to grips with encrypting and decrypting of files saved in the document directories Explore ways to integrate social media with iOS applications Grab the user events and actions on the iOS application using analytic tools Analyze useful information from the data gathered in the cloud Grasp numerous concepts associated with air application distribution Track errors in an application effectively to document them for forensic analysis Read crash reports accumulated on iTunesConnect and decode them to generate and gather useful informationIn DetailMobile device forensics is a branch of digital forensics that involves the recovery of evidence or data in a digital format from a device without affecting its integrity. With the growing popularity of iOS-based Apple devices, iOS forensics has developed immense importance.To cater to the need, this book deals with tasks such as the encryption and decryption of files, various ways to integrate techniques with social media, and ways to grab the user events and actions on the iOS app. Using practical examples, we'll start with the analysis keychain and raw disk decryption, social media integration, and getting accustomed to analytics tools. You'll also learn how to distribute the iOS apps without releasing them to Apple's App Store. Moving on, the book covers test flights and hockey app integration, the crash reporting system, recovery tools, and their features. By the end of the book, using the aforementioned techniques, you will be able to successfully analyze iOS-based devices forensically.Style and approachThis book takes a step-by-step recipe-based approach to iOS forensics and investigation techniques. Topics are explained sequentially in order of complexity, and are accompanied by code and theory that is easy to grasp. Cover ; Copyright; Credits; About the Authors; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Saving and Extracting Data; The Documents directory; Saving data using the RAW file; Saving data in the SQLite database; Learning about core data; Chapter 2: Social Media Integration; Integration with Facebook; Integrating with LinkedIn; Integration with Instagram; Chapter 3: Integrating Data Analytics; Introduction; Google Analytics; Flurry Analytics; Flurry with data mining; Integrating Mixpanel; Chapter 4: App Distribution and Crash Reporting; Setting up and integrating TestFlight Integrating HockeyAppHockeyApp for crash reporting; Chapter 5: Demystifying Crash Reports; Crashlytics integration; Desymbolication of crash logs; Analyzing crash reports; Chapter 6: Forensics Recovery; DFU and Recovery modes; Extracting and reading data; Recovering backups; Extracting data from iTunes backups; Encrypting and decrypting tools; Chapter 7: Forensics Tools; Exploring iPhone Backup Analyzer; Exploring iExplorer; Exploring SQLite browser; Jailbreaking iPhone devices; Index iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 iOS (Electronic resource) fast Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Mobile computing Security measures. Cell phone systems Security measures. Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Enquêtes criminelles. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Récupération des données (Informatique) COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Criminal investigation fast Data recovery (Computer science) fast Birani, Mayank, author. has work: IOS forensics cookbook (Text) https://id.oclc.org/worldcat/entity/E39PD3MJ7b8y3mq4wH73KBkCcP https://id.oclc.org/worldcat/ontology/hasWork Quick answers to common problems. http://id.loc.gov/authorities/names/no2015091434 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1163823 Volltext |
spellingShingle | Birani, Bhanu Birani, Mayank iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / Quick answers to common problems. Cover ; Copyright; Credits; About the Authors; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Saving and Extracting Data; The Documents directory; Saving data using the RAW file; Saving data in the SQLite database; Learning about core data; Chapter 2: Social Media Integration; Integration with Facebook; Integrating with LinkedIn; Integration with Instagram; Chapter 3: Integrating Data Analytics; Introduction; Google Analytics; Flurry Analytics; Flurry with data mining; Integrating Mixpanel; Chapter 4: App Distribution and Crash Reporting; Setting up and integrating TestFlight Integrating HockeyAppHockeyApp for crash reporting; Chapter 5: Demystifying Crash Reports; Crashlytics integration; Desymbolication of crash logs; Analyzing crash reports; Chapter 6: Forensics Recovery; DFU and Recovery modes; Extracting and reading data; Recovering backups; Extracting data from iTunes backups; Encrypting and decrypting tools; Chapter 7: Forensics Tools; Exploring iPhone Backup Analyzer; Exploring iExplorer; Exploring SQLite browser; Jailbreaking iPhone devices; Index iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 iOS (Electronic resource) fast Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Mobile computing Security measures. Cell phone systems Security measures. Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Enquêtes criminelles. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Récupération des données (Informatique) COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Criminal investigation fast Data recovery (Computer science) fast |
subject_GND | http://id.loc.gov/authorities/names/n2010039603 http://id.loc.gov/authorities/subjects/sh85034045 http://id.loc.gov/authorities/subjects/sh88005793 |
title | iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / |
title_auth | iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / |
title_exact_search | iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / |
title_full | iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / Bhanu Birani, Mayank Birani. |
title_fullStr | iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / Bhanu Birani, Mayank Birani. |
title_full_unstemmed | iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / Bhanu Birani, Mayank Birani. |
title_short | iOS forensics cookbook : |
title_sort | ios forensics cookbook over 20 recipes that will enable you to handle and extract data from ios devices for forensics |
title_sub | over 20 recipes that will enable you to handle and extract data from iOS devices for forensics / |
topic | iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 iOS (Electronic resource) fast Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Mobile computing Security measures. Cell phone systems Security measures. Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Enquêtes criminelles. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Récupération des données (Informatique) COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Criminal investigation fast Data recovery (Computer science) fast |
topic_facet | iOS (Electronic resource) Criminal investigation. Mobile computing Security measures. Cell phone systems Security measures. Data recovery (Computer science) Enquêtes criminelles. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Récupération des données (Informatique) COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Criminal investigation |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1163823 |
work_keys_str_mv | AT biranibhanu iosforensicscookbookover20recipesthatwillenableyoutohandleandextractdatafromiosdevicesforforensics AT biranimayank iosforensicscookbookover20recipesthatwillenableyoutohandleandextractdatafromiosdevicesforforensics |