This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. This unique perspective makes this book attractive to ALL forensic investigators. * The authors have the combined experience of Law Enforcement, Military, and Corporate forensics, and have conducted pioneering research in the field of Macintosh-related forensics. Much of the information is a result of the author's own unique research and work. * This book contains information about OS X, iPod, iMac, and iPhone forensic analysis that is not available anywhere else. * The companion DVD for the book contains custom materials (movies, spreadsheet, code, utilities, etc.), that can be used in a real, digital forensic investigation. In addition to just the tools, the authors provide several video "walkthroughs" demonstrating use of the tools in various situations. The disc contains custom tools developed by the authors, which can be used in real-life digital forensic investigations. The companion DVD provides a wealth of resources for the reader. "The ease of use lends itself to more use, and more use creates more artifacts." "There is more information in there than your average cell phone," said Donnelly. Some industry insiders, such as Derrick Donnelly of Blagbag Technologies, a company specializing in Apple forensic solutions, find the iPhone tempting for the amount of potential data it could contain. Similarly, the iPhone presents a wealth of data for digital forensics experts, yet these cyber sleuths attempting to harvest the data must know their stuff. This book walks readers through this intricate process. A forensically sound image of the device can then be made. By putting the iPod into Diagnostic Mode, an investigator can prevent it from automatically mounting and writing to itself. The iPod is a computer in its own right and because of this it will mount and write to its internal hard drive when connected to an investigation workstation thus destroying the forensic integrity of the device. Because iPods can also be used as a mass storage device (with the exception of the iPod shuffle), digital evidence may be stored on these devices. The iPod has become the most popular MP3 player on the market. Including coverage of these MP3 players and cell phones dramatically increases the potential audience for the book as these devices are frequently involved with crimes other than just "computer" crimes. Digital forensic investigators and security professionals subsequently can use data gathered from these devices to aid in the prosecution of criminal cases, litigate civil cases, audit adherence to federal regulatory compliance issues, and identify breech of corporate and government usage policies on networks. The iPhone may reveal more about your misdeeds than you realize." "Technophiles may love the iPhone, but you criminals? Watch out.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |