- Take an Extra 30% Off Any Book: Use promo code HOLIDAY30 at checkout to get an extra 30% off any book for a limited time. Excludes Kindle eBooks and Audible Audiobooks. Restrictions apply. Learn more
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Jonathan Zdziarski is better known as the hacker "NerveGas" in the iPhone development community. His work in cracking the iPhone helped lead the effort to port the first open source applications, and his book, iPhone Open Application Development, taught developers how to write applications for the popular device long before Apple introduced its own SDK. Prior to the release of iPhone Forensics, Jonathan wrote and supported an iPhone forensics manual distributed exclusively to law enforcement. Jonathan frequently consults law enforcement agencies and assists forensic examiners in their investigations. He teaches an iPhone forensics workshop in his spare time to train forensic examiners and corporate security personnel.
Jonathan is also a full-time research scientist specializing in machine learning technology to combat online fraud and spam, an effort that led him to develop networking products capable of learning how to protect customers. He is founder of the DSPAM project, a high-profile, next-generation spam filter that was acquired in 2006 by Sensory Networks, Inc. He lectures widely on the topic of spam and is a foremost researcher in the fields of machine-learning and algorithmic theory.
Jonathan's website is zdziarski.com.
Zdziarski has literally written the bible of iPhone forensics in this book. It is written not from the standpoint of hacking the device, but from obtaining and preserving the... Read morePublished on January 21, 2010 by RICHARD MCKEE
Jonathan has written and developed excellent content in this manual that was orgininally created for LE agencies. Read morePublished on May 27, 2009 by S. PUNJA
This book is an excellent documentation of the processes required to bypass the passcode of a locked iPhone and for hashing and creating a DD image of the two data partitions found... Read morePublished on May 27, 2009 by Robert Elder
This book is a must-have for anyone even considering doing forensic work on iPhones. I have used the methodology in the book and verified it for myself. Excellent resource!!Published on September 25, 2008 by Dozer1