This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic investigators and security professionals subsequently can use data gathered from these devices to aid in the prosecution of criminal cases, litigate civil cases, audit adherence to ...
Read More
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic investigators and security professionals subsequently can use data gathered from these devices to aid in the prosecution of criminal cases, litigate civil cases, audit adherence to federal regulatory compliance issues, and identify breech of corporate and government usage policies on networks. The companion DVD contains custom tools developed by the authors, which can be used in real-life digital forensic investigations.Features of this title are as mentioned below. MAC Disks, Partitioning, and HFS+ File System: manage multiple partitions on a disk, and understand how the operating system stores data. FileVault and Time Machine: decrypt locked FileVault files and restore files backed up with Leopard's Time Machine. Recovering Browser History: uncover traces of Web-surfing activity in Safari with Web cache and .plist files. Recovering Email Artifacts, iChat, and Other Chat Logs: expose communications data in iChat, Address Book, Apple's Mail, MobileMe, and Web-based email. Locating and Recovering Photos: use iPhoto, Spotlight, and shadow files to find artifacts pof photos (e.g., thumbnails) when the originals no longer exist. Finding and Recovering QuickTime Movies and Other Video: understand video file formats - created with iSight, iMovie, or another application - and how to find them.PDF, Word, and Other Document Recovery: recover text documents and metadata with Microsoft Office, OpenOffice, Entourage, Adobe PDF, or other formats. Forensic Acquisition and Analysis of an iPod: document seizure of an iPod model and analyze the iPod image file and artifacts on a Mac. Forensic Acquisition and Analysis of an iPhone: acquire a physical image of an iPhone or iPod Touch and safely analyze without jailbreaking. This title provides a companion DVD that contains custom materials (movies, spreadsheet, code, utilities, etc.) that can be used in a real digital forensic investigation. It includes unique information about Mac OS X, iPod, iMac, and iPhone forensic analysis unavailable anywhere else. Authors are pioneering researchers in the field of Macintosh Forensics, with combined experience in Law Enforcement, Military, and Corporate Forensics.
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).