書名: Practical Mobile Forensics(Second Edition)作者名: Heather Mahalik Rohit Tamma Satish Bommisetty本章字?jǐn)?shù): 121字更新時(shí)間: 2021-07-16 10:55:51
Understanding the iPad hardware
One of the key factors of the success of Apple iOS devices is the proper selection of its hardware components. Just like the iPhone, the iPad is also a collection of modules, chips, and electronic components from different manufacturers. Internal images for all iPads can be found in the teardown section of http://www.ifixit.com/Device/iPad.
The following images show the internals of the iPad Pro. The images were taken after dismantling the iPad Pro cellular model and were obtained from https://www.ifixit.com/Teardown/iPad+Pro+Teardown/52599.

The iPad Pro teardown image ( https://www.ifixit.com/Teardown/iPad+Pro+Teardown/52599)
The following image shows side 1 of the iPad Pro:

The iPad Pro teardown image ( https://www.ifixit.com/Teardown/iPad+Pro+Teardown/52599)
The following image shows side 2 of the iPad Pro:

The iPad Pro teardown image ( https://www.ifixit.com/Teardown/iPad+Pro+Teardown/52599)
推薦閱讀
- 網(wǎng)絡(luò)安全與管理
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- INSTANT Burp Suite Starter
- Computer Forensics with FTK
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 華為防火墻實(shí)戰(zhàn)指南
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- 實(shí)用黑客攻防技術(shù)
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實(shí)戰(zhàn)
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 云計(jì)算安全防護(hù)技術(shù)
- 功能型密碼算法設(shè)計(jì)與分析
- 一本書讀透金融科技安全
- AI+網(wǎng)絡(luò)安全:智網(wǎng)融合空間體系建設(shè)指南