With the iPhone quickly becoming the world's Number 1 mobile device, they are increasingly used for business, and enterprises are finding a need to adequately manage sensitive data. iPhones store an enormous amount of information useful to both security professionals and malicious intruders. Any system administrator responsible for staff who conduct business with the iPhone should know how to recover, analyze, and securely destroy sensitive data. "iPhone Forensics" gives IT professionals, security professionals, and forensic investigators the knowledge needed to conduct complete and highly specialized forensic analysis of an iPhone or iPod Touch.This book - a must-have for corporate compliance and disaster recovery plans - shows the reader how to recover and extract such information as typing caches, Google map searches, deleted images, email, and other sensitive data retained by the iPhone. The reader will learn the same advanced techniques used by law enforcement, including data carving, evidence preservation, and overriding passcode protection. The materials included in this book have been used by over 200 law enforcement agencies worldwide and are now available for private sector investigators and enlightened geeks.
评分
评分
评分
评分
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有