Mac OS X, iPod, and iPhone forensic analysis DVD toolkit:
Tiger and Leopard Mac OS X operating systems -- Getting a handle on Mac hardware -- Mac disks and partitioning -- HFS plus file system -- FileVault -- Time machine -- Acquiring forensic images -- Recovering browser history -- Recovery of E-mail artifacts, iChat, and other chat logs -- Locating and r...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, MA
Syngress Publ.
2009
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020671704&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Zusammenfassung: | Tiger and Leopard Mac OS X operating systems -- Getting a handle on Mac hardware -- Mac disks and partitioning -- HFS plus file system -- FileVault -- Time machine -- Acquiring forensic images -- Recovering browser history -- Recovery of E-mail artifacts, iChat, and other chat logs -- Locating and recovering photos -- Finding and recovering QuickTime movies and other video -- Recovering PDFs, word files, and other documents -- Forensic acquisition of an iPod -- iPod forensics -- Forensic acquisition of an iPhone -- iPhone forensics |
Umfang: | XIX, 551 S. 1 DVD (12 cm) |
ISBN: | 9781597492973 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036754510 | ||
003 | DE-604 | ||
005 | 20101208 | ||
007 | t| | ||
008 | 101103s2009 xx |||| 00||| eng d | ||
010 | |a 2008046538 | ||
020 | |a 9781597492973 |9 978-1-597-49297-3 | ||
035 | |a (OCoLC)637495351 | ||
035 | |a (DE-599)BSZ308116186 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-522 | ||
082 | 0 | |a 363.256 |2 22 | |
245 | 1 | 0 | |a Mac OS X, iPod, and iPhone forensic analysis DVD toolkit |c Jesse Varsalone, technical ed. ; Ryan R. Kubasiak, Sean Morrissey, lead authors ... |
264 | 1 | |a Burlington, MA |b Syngress Publ. |c 2009 | |
300 | |a XIX, 551 S. |e 1 DVD (12 cm) | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | |a Tiger and Leopard Mac OS X operating systems -- Getting a handle on Mac hardware -- Mac disks and partitioning -- HFS plus file system -- FileVault -- Time machine -- Acquiring forensic images -- Recovering browser history -- Recovery of E-mail artifacts, iChat, and other chat logs -- Locating and recovering photos -- Finding and recovering QuickTime movies and other video -- Recovering PDFs, word files, and other documents -- Forensic acquisition of an iPod -- iPod forensics -- Forensic acquisition of an iPhone -- iPhone forensics | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Data recovery (Computer science) | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Macintosh (Computer) | |
700 | 1 | |a Varsalone, Jesse |4 edt | |
700 | 1 | |a Kubasiak, Ryan R. |4 aut | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020671704&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020671704 |
Datensatz im Suchindex
_version_ | 1819316012067061760 |
---|---|
adam_text | IMAGE 1
MAC OS X, IPOD,
AND IPHONE FORENSIC ANALYSIS DVD TOOLKIT JESSE V A R S A L O NE
TECHNICAL EDITOR RYAN R. KUBASIAK, SEAN MORRISSEY LEAD AUTHORS WALTER
BARR JAMES KELLY BROWN MAX CACERES MIKE CHASMAN JAMES CORNELL
IMAGE 2
CONTENTS
ABOUT THE MAC OS X, IPOD, AND IPHONE FORENSIC ANALYSIS DVD TOOLKIT DVD
XIX
CHAPTER 1 TIGER AND LEOPARD MAC OS X OPERATING SYSTEMS 1
INTRODUCTION 2
FIRST RESPONDERS AND SPECIALIZED EXAMINERS 2
DIGITAL EXAMINATION 3
TECHNIQUES FOR EXAMINATION 4
LIVE MACINTOSH EXAMINATION 4
SINGLE USER MODE 4
BOOT CD/DVD METHODS 5
TARGET DISK MODE 5
MACINTOSH HISTORY 5
MACINTOSH ASPECTS 6
IS IT A MAC? 7
FILE SYSTEM OVERVIEW 8
OPERATING SYSTEMS 10
DATA FILES 12
MACINTOSH TECHNOLOGIES 17
THE DESKTOP 17
BACK TO MY MAC 19
GUEST ACCOUNT 20
TIME MACHINE 21
FILEVAULT 22
U N IX AND THE FREEBSD SYSTEM 22
BOOTCAMP, MICROSOFT WINDOWS ON A MAC? 22
TARGET DISK MODE 22
DISK STRUCTURE 23
APPLE PARTITION MAP 23
GUID PARTITION TABLE 25
SUMMARY 28
SOLUTIONS FAST TRACK 28
FREQUENTLY ASKED QUESTIONS 30
IMAGE 3
X CONTENTS
CHAPTER 2 GETTING A HANDLE ON MAC HARDWARE 31
INTRODUCTION 32
MACBOOKS AND DESKTOP COMPUTERS 34
MACBOOK AIR 36
MACBOOK PRO 37
MAC MINI 38
IMAC 38
MAC PRO AND POWERMAC 39
LPODS 41
IPOD CLASSIC 41
IPOD NANO 42
IPOD SHUFFLE 45
IPOD TOUCH 45
IPHONES 46
OTHER HARDWARE 48
AIRPORT EXPRESS AND AIRPORT EXTREME 48
APPLE TV 49
TIME CAPSULE 50
SUMMARY 52
SOLUTIONS FAST TRACK 52
FREQUENTLY ASKED QUESTIONS 54
CHAPTER 3 MAC DISKS AND PARTITIONING 55
INTRODUCTION 56
DISK UTILITY 56
DISK INFO 57
MOUNTING 59
DMG FILES 59
INFO 60
LOCKING 61
UN-MOUNTING 61
EJECTING 61
FIRST AID 62
REPAIRING DISK PERMISSIONS 63
VERIFYING DISK PERMISSIONS 63
ERASING A DISK 63
SECURITY OPTIONS 64
DON T ERASE DATA 65
ZERO OUT DATA 65
7-PASS ERASE 66
35-PASS ERASE 67
IMAGE 4
CONTENTS XI
VOLUME FORMAT OPTIONS 67
MAC OS EXTENDED 67
MAC OS EXTENDED (JOURNALED) 67
MAC OS EXTENDED (CASE-SENSITIVE) 68
MAC OS EXTENDED (CASE-SENSITIVE, JOURNALED) 68
MS-DOS FILE SYSTEM 68
UNIX FILE SYSTEM 68
PARTITIONING 69
VOLUME SCHEMES 70
VOLUME LABELS 71
SPLITTING A PARTITION 71
LOCKED FOR EDITING SETTING 71
REVERTING TO A PREVIOUS VOLUME SCHEME 72
RAID 72
RAID SETS 72
MIRRORED RAID SET 75
STRIPED RAID SET 76
CONCATENATED RAID SET 76
RAID OPTIONS 77
RAID MIRROR AUTOREBUILD 77
RAID BLOCK SIZE 77
RESTORE 77
CREATING A DISK IMAGE 77
CONVERTING AN IMAGE 78
VERIFYING A DISK IMAGE 80
RESTORING AN IMAGE FILE TO A DISK 81
RESTORING A DISK FROM A WEB SERVER 82
CHANGING THE STARTUP DISK 82
TARGET DISK MODE 84
TERMINAL WINDOW - APPLE PARTITION MAP 86
SUMMARY 87
SOLUTIONS FAST TRACK 88
FREQUENTLY ASKED QUESTIONS 90
CHAPTER 4 HFS PLUS FILE SYSTEM 93
INTRODUCTION 94
HFS PLUS VOLUMES 94
SPECIFICATIONS 94
STRUCTURES 95
SIZE LIMITATIONS 97
IMAGE 5
XII CONTENTS
FORKS 98
DATA FORK 98
RESOURCE FORK 98
ADDITIONAL FORKS 98
PERMISSIONS 99
HFS WRAPPER 100
HFSJ 106
HFSX 107
BOOT BLOCKS 107
STARTUP FILE 107
VOLUME HEADER 107
ALTERNATE VOLUME HEADER ^_ 112
ALLOCATION FILE 113
B*-TREES 113
CATALOG FILE 116
EXTENTS OVERFLOW FILE 121
ATTRIBUTES FILE 121
SUMMARY 124
SOLUTIONS FAST TRACK 124
FREQUENTLY ASKED QUESTIONS 126
CHAPTER 5 FILEVAULT 127
INTRODUCTION 128
FILEVAULT OVERVIEW 128
ACQUIRING AN UNLOCKED FILEVAULT 136
DECRYPTING A LOCKED FILEVAULT 141
SUMMARY 143
SOLUTIONS FAST TRACK 143
FREQUENTLY ASKED QUESTIONS 145
CHAPTER 6 TIME MACHINE 147
INTRODUCTION 148
CONFIGURING AND USING TIME MACHINE 149
CUSTOMIZING TIME MACHINE 150
ISSUES OF IMPORTANCE TO INVESTIGATORS 154
RESTORING FILES FROM TIME MACHINE 155
RESTORING SYSTEM SETTINGS 157
FORENSIC IMPLICATIONS 158
TIME MACHINE VOLUMES 161
TIME MACHINE WITH FILEVAULT ENABLED 165
SUMMARY 167
IMAGE 6
CONTENTS XIII
SOLUTIONS FAST TRACK 167
FREQUENTLY ASKED QUESTIONS 168
CHAPTER 7 ACQUIRING FORENSIC IMAGES 169
INTRODUCTION 170
SETTING UP AN ANALYSIS MAC 170
THE SETUP PROCESS, STEP BY STEP 171
IMAGING A MAC WITH A MAC 174
PHYSICAL DISKS AND SLICES 175
THE DISKARBITRATION DAEMON 178
CONNECTING THE MAC TO BE ACQUIRED 179
ACQUISITION PROCESS, STEP BY STEP 181
PITFALLS AND BENEFITS OF IMAGING USING THE DD UTILITY 183
IMAGING A MAC WITH A LIVE CD 184
SUMMARY 187
SOLUTIONS FAST TRACK 187
FREQUENTLY ASKED QUESTIONS 189
CHAPTER 8 RECOVERING BROWSER HISTORY 191
INTRODUCTION 192
RECOVERING ITEMS FROMWEB CACHE 192
~/LIBRARY/CACHES/SAFARI 192
~LIBRARY/SAFARI 196
RECOVERING ITEMS FROM PLIST FILES 196
BOOKMARKS.PLIST 196
DOWNLOADS.PLIST 200
HISTORYPLIST 201
LASTSESSION. PLIST 206
WEBPAGELCONS.DB. 206
COOKIES.PLIST 208
SUMMARY 210
SOLUTIONS FAST TRACK 210
FREQUENTLY ASKED QUESTIONS 211
CHAPTER 9 RECOVERY OF E-MAIL ARTIFACTS, ICHAT, AND OTHER CHAT LOGS 213
INTRODUCTION 214
POPULAR E-MAIL APPLICATIONS 214
MOBILEME (.MAC) AND WEB-BASED E-MAIL 215
RECOVERY OF E-MAIL DATA 217
ADDRESS BOOK 230
IMAGE 7
XIV CONTENTS
POPULAR CHAT APPLICATIONS 234
RECOVERY OF CHAT DATA 234
SUMMARY 238
SOLUTIONS FAST TRACK 238
FREQUENTLY ASKED QUESTIONS 240
CHAPTER 10 LOCATING AND RECOVERING PHOTOS 241
INTRODUCTION 242
DEFINING A PHOTO ON A MACINTOSH 242
LPHOTO 244
RECOVERING IMAGES 252
SPOTLIGHT AND SHADOW FILES 256
SUMMARY 259
SOLUTIONS FAST TRACK 259
FREQUENTLY ASKED QUESTIONS 261
CHAPTER 11 FINDING AND RECOVERING QUICKTIME MOVIES AND OTHER VIDEO 263
INTRODUCTION 264
DEFINING A MOVIE ON A MACINTOSH 264
IMOVIE 267
RECOVERING VIDEO 274
SUMMARY 280
SOLUTIONS FAST TRACK 280
FREQUENTLY ASKED QUESTIONS 282
CHAPTER 12 RECOVERING PDFS, WORD FILES, AND OTHER DOCUMENTS 283
INTRODUCTION 284
MICROSOFT OFFICE 284
OFFICE 2004 284
OFFICE 2008 289
OBJECT-ORIENTED XML FORMAT 289
OPENOFFICE FOR MAC 292
PORTABLE DOCUMENT FORMAT (PDF) 292
TEXT DOCUMENTS 293
RECOVERING OFFICE FILES, PDFS, AND OTHER DOCUMENTS 294
DEFAULT LOCATIONS OF OFFICE ARTIFACTS 295
ENTOURAGE 295
SUMMARY 311
SOLUTIONS FAST TRACK 311
FREQUENTLY ASKED QUESTIONS 312
IMAGE 8
CONTENTS XV
CHAPTER 13 FORENSIC ACQUISITION OF AN IPOD 313
INTRODUCTION 314
DOCUMENTING THE SEIZURE OF AN IPOD 314
APPLE LPODS 315
USING OPEN SOURCE ACQUISITION TOOLS 319
DISABLING THE DISK ARBITRATION DAEMON (TIGER) 320
REENABLING THE DISK ARBITRATION DAEMON (TIGER) 320
DISABLING THE DISK ARBITRATION DAEMON (LEOPARD) 321
REENABLING THE DISK ARBITRATION DAEMON (LEOPARD) 322
CREATING AN IMAGE 322
LIVE CDS 322
VERIFYING THE INTEGRITY OF THE RAW DATA 322
IMAGING THE IPOD DEVICE WITH DC3DD 323
USING PROPRIETARY ACQUISITION TOOLS 324
IMAGING THE IPOD DEVICE WITHIN FTK IMAGER 324
IMAGE THE IPOD DEVICE USING ENCASE 329
IMAGING THE IPOD DEVICE USING BLACKBAG S BBTIMAGERLITE 330
SUMMARY 332
SOLUTIONS FAST TRACK 332
FREQUENTLY ASKED QUESTIONS 333
CHAPTER 14 IPOD FORENSICS 335
INTRODUCTION 336
ANALYZING IPOD PARTITIONING 336
ANALYZING THE IPOD IMAGE FILE ON A MAC 339
MOUNTING AN IPOD IMAGE FILE ON A MAC 339
VIEWING HIDDEN FOLDERS AND FILES 340
EXAMINING IPOD FILES AND FOLDERS 343
CALENDARS 344
CONTACTS 346
DESKTOP FILES 346
IPOD CONTROL 347
ITUNES 348
NOTES 349
PHOTOS 349
RECORDINGS 350
IPODS AS EXTERNAL STORAGE DEVICES 351
VIEWING IPOD ARTIFACTS FROM A CORRESPONDING MAC 351
SUMMARY 353
SOLUTIONS FAST TRACK 353
FREQUENTLY ASKED QUESTIONS 354
IMAGE 9
XVI CONTENTS
CHAPTER 15 FORENSIC ACQUISITION OF AN IPHONE 355
INTRODUCTION 356
IPHONE & IPOD TOUCH FORENSIC CONCERNS 358
METHODS TO ACQUIRE DATA FROM AN IPHONE 359
ITUNES SYNC 359
HACKING THE IPHONE 360
DISASSEMBLY 360
IPHONE & IPOD TOUCH LOGICAL ACQUISITIONS 360
BACKUP A LOGICAL COPY OF THE ITUNES SYNC FOLDER 361
ACQUIRING A PHYSICAL IMAGE OF AN IPHONE 363
/DEV/RDISKO (DISK) 364
/DEV/RDISKOSL (SLICE 1) 364
/DEV/RDISK0S2 (SLICE 2) 365
STEP 1 -JAILBREAK THE IPHONE 366
STEP 2 - DISABLING THE POWER AND SCREEN LOCK FEATURE 372
STEP 3 - INSTALL U N IX UTILITIES ON THE IPHONE (CHOOSE THE CYDIA
INSTALLER) 372
STEP 4 - INSTALL THE SSH DAEMON ON THE IPHONE 374
STEP 5 - INSTALL NETCAT ON THE IPHONE 374
STEP 6 - SET UP A PEER-TO-PEER WIRELESS NETWORK BETWEEN AN IPHONE AND
IMAC 376
STEP 7 - ESTABLISH A SECURE SHELL OR SSH CONNECTION TO AN IPOD 380
STEP 8 - PING YOUR LISTENER SYSTEM 381
STEP 9 - SET UP THE LISTENER 382
STEP 10 - START THE IMAGING PROCESS 382
ANALYSIS OF THE IPHONE IMAGE 383
IPHONE FIRMWARE 2.1 385
TERMINOLOGY 389
BASEBAND 389
UNLOCKING 390
JAILBREAKING 390
SIM CARD 390
SUMMARY 391
SOLUTIONS FAST TRACK 391
FREQUENTLY ASKED QUESTIONS 393
CHAPTER 16 IPHONE FORENSICS 395
INTRODUCTION 396
IPHONE FUNCTIONS 396
IPHONE PARTITIONING 398
IMAGE 10
CONTENTS XVII
FIRST PARTITION 398
FIRST PARTITION FOLDER STRUCTURE 400
THE SECOND PARTITION OR DATA PARTITION 408
LIBRARY 420
ADDRESS BOOK 421
BOSS PREFS 424
CACHES 425
MOBILE CALENDAR 426
CALL HISTORY 426
COOKIES 427
KEYBOARD 428
BACKGROUND/WALLPAPER IMAGE 429
LOGS 429
MOBILE MAIL 429
MOBILE MAPS 436
NOTES 437
PREFERENCES 439
MOBILE SAFARI 441
SMS (SHORT MESSAGE SERVICE) 443
VOICEMAIL 443
YOUTUBE 445
MEDIA FOLDER 446
ITUNES_CONTROL 451
IPHOTOS 452
BASH HISTORY 452
ROOT 453
ADDRESS BOOK 454
CACHES 454
CALENDAR 454
LOCKDOWN 454
PREFERENCES 455
R UN 455
STASH 455
TMP 455
CARVING 456
SUBROSASOFT S MACFORENSICSLAB 456
ACCESS DATA S FORENSIC TOOL KIT 457
NON-JAILBREAKING METHOD OF IPHONE ANALYSIS 458
PROPERTY LISTS FROM THE SUSPECT S MAC 470
IMAGE 11
CONTENTS
OTHER NON-JAILBREAK METHODS OF IPHONE FORENSICS 472
IPHONE SIM CARD 473
NMAP THE IPHONE 473
SUMMARY 474
SOLUTIONS FAST TRACK 474
FREQUENTLY ASKED QUESTIONS 475
APPENDIX A USING BOOT CAMP, PARALLELS, AND VMWARE FUSION IN A MAC
ENVIRONMENT 477
INTRODUCTION 478
BOOT CAMP 479
DUAL-BOOTING MAC AND WINDOWS 480
DUAL-BOOTING MAC AND LINUX 489
PARALLELS 490
CONFIGURING PARALLELS 490
INSTALLING AN OPERATING SYSTEM 491
WINDOWS 491
LINUX 494
OS X 10.5.X SERVER 505
BOOT CAMP IN PARALLELS 515
COHERENCE 517
VMWARE FUSION 518
VIRTUALBOX 518
SUMMARY 520
SOLUTIONS FAST TRACK 520
FREQUENTLY ASKED QUESTIONS 521
APPENDIX * CAPTURING VOLATILE DATA ON A MAC 523
INTRODUCTION 524
VOLATILE DATA COLLECTION 524
VOLATILE DATA COLLECTION ON AN UNLOCKED SYSTEM 524
VOLATILE DATA COLLECTION ON A LOCKED SYSTEM 527
THE FIREWIRE ATTACK 528
MSRAMDMP 528
SUMMARY 538
SOLUTIONS FAST TRACK 538
FREQUENTLY ASKED QUESTIONS 539
INDEX 541
|
any_adam_object | 1 |
author | Kubasiak, Ryan R. |
author2 | Varsalone, Jesse |
author2_role | edt |
author2_variant | j v jv |
author_facet | Kubasiak, Ryan R. Varsalone, Jesse |
author_role | aut |
author_sort | Kubasiak, Ryan R. |
author_variant | r r k rr rrk |
building | Verbundindex |
bvnumber | BV036754510 |
ctrlnum | (OCoLC)637495351 (DE-599)BSZ308116186 |
dewey-full | 363.256 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.256 |
dewey-search | 363.256 |
dewey-sort | 3363.256 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01837nam a2200361 c 4500</leader><controlfield tag="001">BV036754510</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101208 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101103s2009 xx |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008046538</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492973</subfield><subfield code="9">978-1-597-49297-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)637495351</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ308116186</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.256</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mac OS X, iPod, and iPhone forensic analysis DVD toolkit</subfield><subfield code="c">Jesse Varsalone, technical ed. ; Ryan R. Kubasiak, Sean Morrissey, lead authors ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Publ.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 551 S.</subfield><subfield code="e">1 DVD (12 cm)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Tiger and Leopard Mac OS X operating systems -- Getting a handle on Mac hardware -- Mac disks and partitioning -- HFS plus file system -- FileVault -- Time machine -- Acquiring forensic images -- Recovering browser history -- Recovery of E-mail artifacts, iChat, and other chat logs -- Locating and recovering photos -- Finding and recovering QuickTime movies and other video -- Recovering PDFs, word files, and other documents -- Forensic acquisition of an iPod -- iPod forensics -- Forensic acquisition of an iPhone -- iPhone forensics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data recovery (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Macintosh (Computer)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Varsalone, Jesse</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kubasiak, Ryan R.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020671704&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020671704</subfield></datafield></record></collection> |
id | DE-604.BV036754510 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T14:41:21Z |
institution | BVB |
isbn | 9781597492973 |
language | English |
lccn | 2008046538 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020671704 |
oclc_num | 637495351 |
open_access_boolean | |
owner | DE-522 |
owner_facet | DE-522 |
physical | XIX, 551 S. 1 DVD (12 cm) |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Syngress Publ. |
record_format | marc |
spellingShingle | Kubasiak, Ryan R. Mac OS X, iPod, and iPhone forensic analysis DVD toolkit Computer security Data recovery (Computer science) Computer crimes Macintosh (Computer) |
title | Mac OS X, iPod, and iPhone forensic analysis DVD toolkit |
title_auth | Mac OS X, iPod, and iPhone forensic analysis DVD toolkit |
title_exact_search | Mac OS X, iPod, and iPhone forensic analysis DVD toolkit |
title_full | Mac OS X, iPod, and iPhone forensic analysis DVD toolkit Jesse Varsalone, technical ed. ; Ryan R. Kubasiak, Sean Morrissey, lead authors ... |
title_fullStr | Mac OS X, iPod, and iPhone forensic analysis DVD toolkit Jesse Varsalone, technical ed. ; Ryan R. Kubasiak, Sean Morrissey, lead authors ... |
title_full_unstemmed | Mac OS X, iPod, and iPhone forensic analysis DVD toolkit Jesse Varsalone, technical ed. ; Ryan R. Kubasiak, Sean Morrissey, lead authors ... |
title_short | Mac OS X, iPod, and iPhone forensic analysis DVD toolkit |
title_sort | mac os x ipod and iphone forensic analysis dvd toolkit |
topic | Computer security Data recovery (Computer science) Computer crimes Macintosh (Computer) |
topic_facet | Computer security Data recovery (Computer science) Computer crimes Macintosh (Computer) |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020671704&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT varsalonejesse macosxipodandiphoneforensicanalysisdvdtoolkit AT kubasiakryanr macosxipodandiphoneforensicanalysisdvdtoolkit |