iPhone and iOS Forensics and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Start reading iPhone and iOS Forensics on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices [Paperback]

Andrew Hoog , Katie Strzempka

List Price: CDN$ 75.07
Price: CDN$ 72.89 & FREE Shipping. Details
You Save: CDN$ 2.18 (3%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Want it delivered Tuesday, September 23? Choose One-Day Shipping at checkout.


Amazon Price New from Used from
Kindle Edition CDN $61.35  
Paperback CDN $72.89  
Save Up to 90% on Textbooks
Hit the books in Amazon.ca's Textbook Store and save up to 90% on used textbooks and 35% on new textbooks. Learn more.
Join Amazon Student in Canada

Book Description

June 16 2011 1597496596 978-1597496599 1

As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.

  • Learn techniques to forensically acquire the iPhone, iPad and other iOS devices
  • Entire chapter focused on Data and Application Security that can assist not only forensic investigators, but also application developers and IT security managers
  • In-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system

Special Offers and Product Promotions

  • Join Amazon Student in Canada

Customers Who Bought This Item Also Bought

Product Details

Product Description


"iPhone and iOS Forensics is a must read by all digital forensic examiners, even the most educated person in the iPhone environment will discover something new in this highly valuable book. The author has proven himself many times over to be a valuable resource to the digital community at large, and this book is the culmination of all of that work. I will not conduct another iOS analysis without using this book as my reference!" -Ryan R. Kubasiak, Investigator, Computer Crime Unit and Editor AppleExaminer.com

"Covering iOS file system information, device application and security, acquisition and analysis methods, this book takes one from basic to advanced information and techniques related to the iOS family of devices. Andrew and Katie have put together a valuable resource for security professionals and forensic examiners alike." -Danny Garcia, DG Digital Services, LLC

"This book is an excellent reference for examiners in the field, looking to understand the many different approaches to forensic imaging of an iPhone." -Jonathan Zdziarski, iPhone forensics expert

From the Back Cover

As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at the core hardware and software components of an iPhone, file systems and data structures, data security considerations, and a detailed review of forensic acquisition techniques and strategies for the subsequent analysis required. A heavy emphasis on open source tools and step-by-step examples are a primary focus of this book.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 4.0 out of 5 stars  4 reviews
6 of 6 people found the following review helpful
4.0 out of 5 stars One-Stop Shopping July 11 2011
By Eric Huber - Published on Amazon.com
Format:Paperback|Verified Purchase
Andrew Hoog and Katie Strzempka turn out a first class effort as they take the reader through the world of iOS forensics and security. This book is appropriate for digital forensics examiners and incident responders of any level. As an added bonus, the iOS data security coverage makes it a nice option for those who are trying to decide if iOS devices are the right fit for their organization from a security standpoint.

This book provides a comprehensive view of the iOS forensics world. It handles the topic of acquisition in the manner that readers of good digital forensics books would expect. The authors speak clearly and at length about the various options to acquire data using a variety of methods that result in the logical and physical acquisition of data. They also spend an entire chapter on the topic of iOS data security which would likely be of great interest to those who aren't necessarily in the incident response and forensics world, but are interested in learning more about the security ramifications of introducing these devices into their environment. This book not only describes a variety of important security issues such as application security, but also provides recommended methods to best secure these devices.

It was the analytical portion of the book that I found to be the most impressive. The authors put forth an exemplary effort explaining the structure of the operating system and select applications using open source tools. I appreciated that the authors decision to handle the analytical portion of the book using an open source approach rather than teaching it through the prism of the paid tools. At times, this book felt like the iOS version of Digital Forensics with Open Source Tools given all of the references to classic open source tools like scalpel and The Sleuth Kit. Those who don't have the money for the more expensive commercial tools will appreciate this approach as they will be able to immediately implement what they are learning without being hobbled by lack of a tool budget.

The authors don't ignore the commercial tools, however. Chapter 7 is devoted to testing a wide variety of commercial tools against a test data set from a 3G iPhone. This section of the book is well done and provides the reader with a solid overview of the various tools along with a decent amount of screen shots. Unfortunately, the image quality of some the screenshots for my Kindle edition of the book (which I tested on several different devices) was sometimes lacking which caused me to remove a star from the review of the book. For example, the results for the testing of Cellebrite UFED were very difficult to read.

Taken as a whole, I strongly recommend this book to anyone who is interested in iOS digital forensics, incident response, and general security issues. My recommendation for anyone who is interested in the subject matter is to start with this book first and then decide if they need to read any other books. This book feels as close to one stop shopping as you will find at the present time which should help take the edge off the high price of the book.
4.0 out of 5 stars Needs Updating May 18 2014
By T. Slusher - Published on Amazon.com
Format:Kindle Edition|Verified Purchase
A good book but I would like to see an updated version come out soon. A good read for anyone starting out.
5.0 out of 5 stars Excellent source of information Oct. 17 2012
By Jesse G. Lands - Published on Amazon.com
Format:Paperback|Verified Purchase
iPhone and iOS Forensics is the first iOS forensics book I have read. So at this point I have nothing to compare it to. That being said I have already picked up a number of forensic books to read and contrast it with, but none of the currently available books is as up to date as this one.
The book is roughly three hundred pages without the index and ten pages of that are the Appendix A through C. Unlike other books the appendixes are extremely useful. Many times they are a collection of garbage to add pages, but these are quick reference pages for backup locations, useful tools for forensic investigation of iOS, and the system file structure of an iPhone. Which version the structure references I'm not sure, but most likely whatever was the latest at time of writing.
Of the content there were seven total chapters. I found all the chapters extremely helpful with the exception of the largest chapter. Chapter seven was a review of commercial tools available for forensic analysis of an iOS device. While this chapter was somewhat helpful it was a lot of repetitive data that I am not going to apply to use in most day to day forensic analysis cases.
While chapters one through four had very little in the way of forensics they were actually the most useful chapters in my opinion. The first chapter focused the basics of iphone, models, hardware etc.. and then went into the theory of mobile forensics and how to apply it to the rest of the book
Chapter two covered all the basic information that a forensic examiner may or may not already know and how these basic steps that many examiners might take for granted would apply to a potential investigation.
Chapter three covered the basic filesystem and structure of the iOS operating system. While it was basically a *nix based system this chapter goes over the basic differences in them.
Chapter four goes over the basic security that Apple has built into the iOS device. Covering the differences in the pin on the device and applying a password into a backup that is acquired through iTunes.
Chapter five cover acquiring and image of forensic data off of the device. My only disappointment was the lack of a real opensource option other than jailbreaking. While this is not a fault of the book a reader should not expect a "cheap" option other than jailbreaking. It does cover using a backup, but this does not give you access to the system files. So if you only need user data you should feel comfortable with this portion. If however you are required to examine the device for malicious software jailbreaking will be the only option that does not require payment and NDA.
Chapter six covers actually examining and analyzing the data that had been received in the previous chapter.
While overall this book is excellent as a source for forensic analysis of an iOS device there is very little to compare it to. Not taking anything away from this book, it is by far an excellent source of information and if you ever believe you may have to examine an Apple device I would recommend you have a copy of this book on your shelf.
0 of 23 people found the following review helpful
3.0 out of 5 stars This was a gift Feb. 13 2013
By The Professor - Published on Amazon.com
Format:Paperback|Verified Purchase
No clue what to say..bought this as a gift. I didn't even open it, Computer Forensics is not my thing.

Look for similar items by category