IPhone forensics: recovering evidence, personal data, and corporate assets
With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensic...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol, Calif.
O'Reilly Media
2008
|
Ausgabe: | 1st ed. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780596153588/?ar |
Zusammenfassung: | With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. |
Beschreibung: | Print version record |
Umfang: | 1 Online-Ressource (xv, 120 Seiten) illustrations |
ISBN: | 9780596153588 0596153589 9780596555030 0596555032 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047494255 | ||
003 | DE-627-1 | ||
005 | 20240228114324.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2008 xx |||||o 00| ||eng c | ||
020 | |a 9780596153588 |9 978-0-596-15358-8 | ||
020 | |a 0596153589 |9 0-596-15358-9 | ||
020 | |a 9780596555030 |c electronic bk. |9 978-0-596-55503-0 | ||
020 | |a 0596555032 |c electronic bk. |9 0-596-55503-2 | ||
035 | |a (DE-627-1)047494255 | ||
035 | |a (DE-599)KEP047494255 | ||
035 | |a (ORHE)9780596153588 | ||
035 | |a (DE-627-1)047494255 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 621.38456 |2 22 | |
100 | 1 | |a Zdziarski, Jonathan A. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a IPhone forensics |b recovering evidence, personal data, and corporate assets |c Jonathan Zdziarski |
250 | |a 1st ed. | ||
264 | 1 | |a Sebastopol, Calif. |b O'Reilly Media |c 2008 | |
300 | |a 1 Online-Ressource (xv, 120 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. | ||
650 | 0 | |a iPhone (Smartphone) | |
650 | 0 | |a iPod (Digital music player) | |
650 | 0 | |a Cell phone systems |x Security measures | |
650 | 0 | |a Mobile computing |x Security measures | |
650 | 0 | |a Internet programming | |
650 | 0 | |a Multimedia systems | |
650 | 4 | |a iPhone (Téléphone intelligent) | |
650 | 4 | |a iPod (Lecteurs de musique numérique) | |
650 | 4 | |a Téléphonie cellulaire ; Sécurité ; Mesures | |
650 | 4 | |a Informatique mobile ; Sécurité ; Mesures | |
650 | 4 | |a Programmation Internet | |
650 | 4 | |a Multimédia | |
650 | 4 | |a iPhone (Smartphone) | |
650 | 4 | |a iPod (Digital music player) | |
650 | 4 | |a Cellular telephone systems ; Security measures | |
650 | 4 | |a Mobile computing ; Security measures | |
650 | 4 | |a Internet programming | |
650 | 4 | |a Multimedia systems | |
650 | 4 | |a Internet programming | |
650 | 4 | |a iPhone (Smartphone) | |
650 | 4 | |a iPod (Digital music player) | |
650 | 4 | |a Multimedia systems | |
776 | 1 | |z 9780596153588 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780596153588 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780596153588/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047494255 |
---|---|
_version_ | 1821494894577844225 |
adam_text | |
any_adam_object | |
author | Zdziarski, Jonathan A. |
author_facet | Zdziarski, Jonathan A. |
author_role | aut |
author_sort | Zdziarski, Jonathan A. |
author_variant | j a z ja jaz |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047494255 (DE-599)KEP047494255 (ORHE)9780596153588 |
dewey-full | 621.38456 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.38456 |
dewey-search | 621.38456 |
dewey-sort | 3621.38456 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
edition | 1st ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02829cam a22006732 4500</leader><controlfield tag="001">ZDB-30-ORH-047494255</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114324.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2008 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596153588</subfield><subfield code="9">978-0-596-15358-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596153589</subfield><subfield code="9">0-596-15358-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780596555030</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-596-55503-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596555032</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-596-55503-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047494255</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047494255</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780596153588</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047494255</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.38456</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zdziarski, Jonathan A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IPhone forensics</subfield><subfield code="b">recovering evidence, personal data, and corporate assets</subfield><subfield code="c">Jonathan Zdziarski</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, Calif.</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 120 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">iPhone (Smartphone)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">iPod (Digital music player)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cell phone systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet programming</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Multimedia systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">iPhone (Téléphone intelligent)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">iPod (Lecteurs de musique numérique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Téléphonie cellulaire ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique mobile ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programmation Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimédia</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">iPhone (Smartphone)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">iPod (Digital music player)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cellular telephone systems ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimedia systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">iPhone (Smartphone)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">iPod (Digital music player)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimedia systems</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780596153588</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780596153588</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780596153588/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047494255 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:38Z |
institution | BVB |
isbn | 9780596153588 0596153589 9780596555030 0596555032 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xv, 120 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Zdziarski, Jonathan A. VerfasserIn aut IPhone forensics recovering evidence, personal data, and corporate assets Jonathan Zdziarski 1st ed. Sebastopol, Calif. O'Reilly Media 2008 1 Online-Ressource (xv, 120 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. iPhone (Smartphone) iPod (Digital music player) Cell phone systems Security measures Mobile computing Security measures Internet programming Multimedia systems iPhone (Téléphone intelligent) iPod (Lecteurs de musique numérique) Téléphonie cellulaire ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Programmation Internet Multimédia Cellular telephone systems ; Security measures Mobile computing ; Security measures 9780596153588 Erscheint auch als Druck-Ausgabe 9780596153588 |
spellingShingle | Zdziarski, Jonathan A. IPhone forensics recovering evidence, personal data, and corporate assets iPhone (Smartphone) iPod (Digital music player) Cell phone systems Security measures Mobile computing Security measures Internet programming Multimedia systems iPhone (Téléphone intelligent) iPod (Lecteurs de musique numérique) Téléphonie cellulaire ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Programmation Internet Multimédia Cellular telephone systems ; Security measures Mobile computing ; Security measures |
title | IPhone forensics recovering evidence, personal data, and corporate assets |
title_auth | IPhone forensics recovering evidence, personal data, and corporate assets |
title_exact_search | IPhone forensics recovering evidence, personal data, and corporate assets |
title_full | IPhone forensics recovering evidence, personal data, and corporate assets Jonathan Zdziarski |
title_fullStr | IPhone forensics recovering evidence, personal data, and corporate assets Jonathan Zdziarski |
title_full_unstemmed | IPhone forensics recovering evidence, personal data, and corporate assets Jonathan Zdziarski |
title_short | IPhone forensics |
title_sort | iphone forensics recovering evidence personal data and corporate assets |
title_sub | recovering evidence, personal data, and corporate assets |
topic | iPhone (Smartphone) iPod (Digital music player) Cell phone systems Security measures Mobile computing Security measures Internet programming Multimedia systems iPhone (Téléphone intelligent) iPod (Lecteurs de musique numérique) Téléphonie cellulaire ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Programmation Internet Multimédia Cellular telephone systems ; Security measures Mobile computing ; Security measures |
topic_facet | iPhone (Smartphone) iPod (Digital music player) Cell phone systems Security measures Mobile computing Security measures Internet programming Multimedia systems iPhone (Téléphone intelligent) iPod (Lecteurs de musique numérique) Téléphonie cellulaire ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Programmation Internet Multimédia Cellular telephone systems ; Security measures Mobile computing ; Security measures |
work_keys_str_mv | AT zdziarskijonathana iphoneforensicsrecoveringevidencepersonaldataandcorporateassets |