iOS forensics for investigators :: take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence /
"Forensic analysts and investigators interested in extending their skills to extract data from iOS devices, including system logs, device usage, and third-party application data, will find this book useful. Anyone familiar with the principles of digital forensics and looking to expand their kno...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
2022.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Forensic analysts and investigators interested in extending their skills to extract data from iOS devices, including system logs, device usage, and third-party application data, will find this book useful. Anyone familiar with the principles of digital forensics and looking to expand their knowledge base in deep iOS examinations will also benefit from this book.Knowledge of mobile forensic principles, data extraction, Unix/Linux terminal, and some hands-on understanding of databases and SQL query language is assumed."--Provided by publisher |
Beschreibung: | 1 online resource (xvii, 295 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1803242515 9781803242514 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1314623659 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 220507s2022 enka ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d ORMDA |d EBLCP |d UKMGB |d OCLCF |d OCLCQ |d N$T |d UKAHL |d OCLCQ |d IEEEE |d OCLCO |d FUT | ||
015 | |a GBC274206 |2 bnb | ||
016 | 7 | |a 020566511 |2 Uk | |
020 | |a 1803242515 | ||
020 | |a 9781803242514 |q (electronic bk.) | ||
020 | |z 9781803234083 |q (pbk.) | ||
020 | |z 1803234083 |q (pbk.) | ||
035 | |a (OCoLC)1314623659 | ||
037 | |a 9781803234083 |b O'Reilly Media | ||
037 | |a 10162501 |b IEEE | ||
050 | 4 | |a QA76.774.I67 |b T547 2022 | |
082 | 7 | |a 004.167 |2 23/eng/20220510 | |
049 | |a MAIN | ||
100 | 1 | |a Tiepolo, Gianluca, |e author. | |
245 | 1 | 0 | |a iOS forensics for investigators : |b take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / |c Gianluca Tiepolo. |
264 | 1 | |a Birmingham : |b Packt Publishing, Limited, |c 2022. | |
300 | |a 1 online resource (xvii, 295 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
520 | |a "Forensic analysts and investigators interested in extending their skills to extract data from iOS devices, including system logs, device usage, and third-party application data, will find this book useful. Anyone familiar with the principles of digital forensics and looking to expand their knowledge base in deep iOS examinations will also benefit from this book.Knowledge of mobile forensic principles, data extraction, Unix/Linux terminal, and some hands-on understanding of databases and SQL query language is assumed."--Provided by publisher | ||
505 | 0 | |a Introducing iOS Forensics Data Acquisition from iOS Devices Using Forensic Tools Working with Common iOS Artifacts Pattern-of-Life Forensics Dissecting Location Data Analyzing Connectivity Data Email and Messaging Forensics Photo, Video, and Audio Forensics Analyzing Third-party Apps Locked Devices, iTunes Backups, and iCloud Forensics Writing a Forensic Report and Building a Timeline. | |
588 | |a Description based on print version record. | ||
630 | 0 | 0 | |a iOS (Electronic resource) |0 http://id.loc.gov/authorities/names/n2010039603 |
630 | 0 | 7 | |a iOS (Electronic resource) |2 fast |
650 | 0 | |a Criminal investigation. |0 http://id.loc.gov/authorities/subjects/sh85034045 | |
650 | 0 | |a Mobile computing |x Security measures. | |
650 | 0 | |a Cell phone systems |x Security measures. | |
650 | 0 | |a Data recovery (Computer science) |0 http://id.loc.gov/authorities/subjects/sh88005793 | |
650 | 6 | |a Enquêtes criminelles. | |
650 | 6 | |a Informatique mobile |x Sécurité |x Mesures. | |
650 | 6 | |a Téléphonie cellulaire |x Sécurité |x Mesures. | |
650 | 6 | |a Récupération des données (Informatique) | |
650 | 7 | |a Criminal investigation |2 fast | |
650 | 7 | |a Data recovery (Computer science) |2 fast | |
776 | 0 | 8 | |i Print version: |a Tiepolo, Gianluca. |t IOS Forensics for Investigators. |d Birmingham : Packt Publishing, Limited, ©2022 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3265380 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH39825305 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6970203 | ||
938 | |a EBSCOhost |b EBSC |n 3265380 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1314623659 |
---|---|
_version_ | 1816882560177799168 |
adam_text | |
any_adam_object | |
author | Tiepolo, Gianluca |
author_facet | Tiepolo, Gianluca |
author_role | aut |
author_sort | Tiepolo, Gianluca |
author_variant | g t gt |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.774.I67 T547 2022 |
callnumber-search | QA76.774.I67 T547 2022 |
callnumber-sort | QA 276.774 I67 T547 42022 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introducing iOS Forensics Data Acquisition from iOS Devices Using Forensic Tools Working with Common iOS Artifacts Pattern-of-Life Forensics Dissecting Location Data Analyzing Connectivity Data Email and Messaging Forensics Photo, Video, and Audio Forensics Analyzing Third-party Apps Locked Devices, iTunes Backups, and iCloud Forensics Writing a Forensic Report and Building a Timeline. |
ctrlnum | (OCoLC)1314623659 |
dewey-full | 004.167 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.167 |
dewey-search | 004.167 |
dewey-sort | 14.167 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03500cam a2200601 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1314623659</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">220507s2022 enka ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">ORMDA</subfield><subfield code="d">EBLCP</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">FUT</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC274206</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">020566511</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1803242515</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803242514</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781803234083</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1803234083</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1314623659</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781803234083</subfield><subfield code="b">O'Reilly Media</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10162501</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.774.I67</subfield><subfield code="b">T547 2022</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.167</subfield><subfield code="2">23/eng/20220510</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tiepolo, Gianluca,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">iOS forensics for investigators :</subfield><subfield code="b">take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence /</subfield><subfield code="c">Gianluca Tiepolo.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 295 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Forensic analysts and investigators interested in extending their skills to extract data from iOS devices, including system logs, device usage, and third-party application data, will find this book useful. Anyone familiar with the principles of digital forensics and looking to expand their knowledge base in deep iOS examinations will also benefit from this book.Knowledge of mobile forensic principles, data extraction, Unix/Linux terminal, and some hands-on understanding of databases and SQL query language is assumed."--Provided by publisher</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introducing iOS Forensics Data Acquisition from iOS Devices Using Forensic Tools Working with Common iOS Artifacts Pattern-of-Life Forensics Dissecting Location Data Analyzing Connectivity Data Email and Messaging Forensics Photo, Video, and Audio Forensics Analyzing Third-party Apps Locked Devices, iTunes Backups, and iCloud Forensics Writing a Forensic Report and Building a Timeline.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">iOS (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2010039603</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">iOS (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Criminal investigation.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034045</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cell phone systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data recovery (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh88005793</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Enquêtes criminelles.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Informatique mobile</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Téléphonie cellulaire</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Récupération des données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminal investigation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data recovery (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Tiepolo, Gianluca.</subfield><subfield code="t">IOS Forensics for Investigators.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2022</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3265380</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH39825305</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6970203</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">3265380</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1314623659 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:30:33Z |
institution | BVB |
isbn | 1803242515 9781803242514 |
language | English |
oclc_num | 1314623659 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvii, 295 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing, Limited, |
record_format | marc |
spelling | Tiepolo, Gianluca, author. iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / Gianluca Tiepolo. Birmingham : Packt Publishing, Limited, 2022. 1 online resource (xvii, 295 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. "Forensic analysts and investigators interested in extending their skills to extract data from iOS devices, including system logs, device usage, and third-party application data, will find this book useful. Anyone familiar with the principles of digital forensics and looking to expand their knowledge base in deep iOS examinations will also benefit from this book.Knowledge of mobile forensic principles, data extraction, Unix/Linux terminal, and some hands-on understanding of databases and SQL query language is assumed."--Provided by publisher Introducing iOS Forensics Data Acquisition from iOS Devices Using Forensic Tools Working with Common iOS Artifacts Pattern-of-Life Forensics Dissecting Location Data Analyzing Connectivity Data Email and Messaging Forensics Photo, Video, and Audio Forensics Analyzing Third-party Apps Locked Devices, iTunes Backups, and iCloud Forensics Writing a Forensic Report and Building a Timeline. Description based on print version record. iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 iOS (Electronic resource) fast Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Mobile computing Security measures. Cell phone systems Security measures. Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Enquêtes criminelles. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Récupération des données (Informatique) Criminal investigation fast Data recovery (Computer science) fast Print version: Tiepolo, Gianluca. IOS Forensics for Investigators. Birmingham : Packt Publishing, Limited, ©2022 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3265380 Volltext |
spellingShingle | Tiepolo, Gianluca iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / Introducing iOS Forensics Data Acquisition from iOS Devices Using Forensic Tools Working with Common iOS Artifacts Pattern-of-Life Forensics Dissecting Location Data Analyzing Connectivity Data Email and Messaging Forensics Photo, Video, and Audio Forensics Analyzing Third-party Apps Locked Devices, iTunes Backups, and iCloud Forensics Writing a Forensic Report and Building a Timeline. iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 iOS (Electronic resource) fast Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Mobile computing Security measures. Cell phone systems Security measures. Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Enquêtes criminelles. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Récupération des données (Informatique) Criminal investigation fast Data recovery (Computer science) fast |
subject_GND | http://id.loc.gov/authorities/names/n2010039603 http://id.loc.gov/authorities/subjects/sh85034045 http://id.loc.gov/authorities/subjects/sh88005793 |
title | iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / |
title_auth | iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / |
title_exact_search | iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / |
title_full | iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / Gianluca Tiepolo. |
title_fullStr | iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / Gianluca Tiepolo. |
title_full_unstemmed | iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / Gianluca Tiepolo. |
title_short | iOS forensics for investigators : |
title_sort | ios forensics for investigators take mobile forensics to the next level by analyzing extracting and reporting sensitive evidence |
title_sub | take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence / |
topic | iOS (Electronic resource) http://id.loc.gov/authorities/names/n2010039603 iOS (Electronic resource) fast Criminal investigation. http://id.loc.gov/authorities/subjects/sh85034045 Mobile computing Security measures. Cell phone systems Security measures. Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Enquêtes criminelles. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Récupération des données (Informatique) Criminal investigation fast Data recovery (Computer science) fast |
topic_facet | iOS (Electronic resource) Criminal investigation. Mobile computing Security measures. Cell phone systems Security measures. Data recovery (Computer science) Enquêtes criminelles. Informatique mobile Sécurité Mesures. Téléphonie cellulaire Sécurité Mesures. Récupération des données (Informatique) Criminal investigation |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3265380 |
work_keys_str_mv | AT tiepologianluca iosforensicsforinvestigatorstakemobileforensicstothenextlevelbyanalyzingextractingandreportingsensitiveevidence |