- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 136字
- 2021-06-24 16:39:07
Summary
The first step in the forensic examination of an iOS device should be identifying the device model. The model of an iOS device can be used to help you as the examiner develop an understanding of the underlying components and capabilities of the device, which can be used to drive the methods for acquisition and examination. Legacy iOS devices should not be disregarded, because they may surface as part of an investigation. You must be aware of all iOS devices, as old devices are sometimes still in use and may be tied to a criminal investigation.
The next chapter will provide tools that will aid in obtaining data from iOS devices to later forensically examine. Not all tools are created equal, so it's important to know the best tools to get the job done properly.
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- INSTANT Netcat Starter
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實(shí)踐
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- Digital Forensics with Kali Linux
- VMware vCloud Security
- INSTANT Kali Linux
- 數(shù)字銀行安全體系構(gòu)建
- 安全網(wǎng)絡(luò)構(gòu)建
- 紅藍(lán)攻防:技術(shù)與策略(原書第3版)
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- 動(dòng)態(tài)賦能網(wǎng)絡(luò)空間防御
- 網(wǎng)絡(luò)空間安全體系