So, learning how to extract data from them should start with finding out the differences between the various models and the various forensic examination approaches – all covered in the first chapter, with a special mention of Linux forensic tools. ![]() And among the most popular devices in these two newer categories are definitely the iPhone (nearly 150 million units sold so far) and the iPad (circa 25 million sold).īeing Apple products and running Apple’s iOS mobile platform, they differ in many ways from similar devices offered by other companies, both in the design and functioning. With the advent of smartphones and tablet computers, much of the data that has previously been stored on desktop and laptop computers has also found its way to those devices. She performs forensic investigations, security audits and research, and has trained investigators around the world in mobile forensics. Katie Strzempka is a Technology Consultant with viaForensics. Luckily, all that knowledge is shared in this book.Īndrew Hoog is a computer scientist, certified forensic analyst (GCFA and CCE), computer and mobile forensics researcher, former adjunct professor (assembly language) and owner of viaForensics, an innovative computer and mobile forensic firm. ![]() With the seemingly unstoppable popularity of Apple mobile devices such as the iPhone and the iPad, forensic specialists need to learn about the specific device models and their features, functions and file system, how to use the most popular commercial tools for analyzing and recovering the data and applications contained within them, and how to do it all in a legal manner.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |