iPhone and iOS Forensics and thousands of other textbooks are available for instant download on your Kindle Fire tablet or on the free Kindle apps for iPad, Android tablets, PC or Mac.
Buy New
  • List Price: $69.95
  • Save: $9.74 (14%)
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $8.24
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices Paperback – June 15, 2007

ISBN-13: 978-1597496599 ISBN-10: 1597496596 Edition: 1st

Buy New
Price: $60.21
26 New from $44.85 10 Used from $44.80
Rent from Amazon Price New from Used from
"Please retry"
"Please retry"
$44.85 $44.80


Frequently Bought Together

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices + Android Forensics: Investigation, Analysis and Mobile Security for Google Android + Digital Forensics with Open Source Tools
Price for all three: $170.77

Buy the selected items together

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 336 pages
  • Publisher: Syngress; 1 edition (June 15, 2007)
  • Language: English
  • ISBN-10: 1597496596
  • ISBN-13: 978-1597496599
  • Product Dimensions: 9.1 x 7.5 x 1 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #763,458 in Books (See Top 100 in Books)

Editorial Reviews

Amazon.com Review

As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at the methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.

  • Learn techniques to forensically acquire the iPhone, iPad, and other iOS devices
  • An entire chapter focused on data and application security can assist not only forensic investigators, but also application developers and IT security managers
  • Features an in-depth analysis of many of the common applications (both default and downloaded), including where specific data is found within the file system

Amazon Exclusive: Andrew Hoog and Katiey Strzempka, Authors of iPhone and iOS Forensics, Offer Their Top Ten Examples of Data that Can Be Recovered from an iPhone or Android Device

Smartphones are used extensively around the world and serve many purposes. What consumers may not realize, however, is that much of the information stored on these devices can be easily recovered by forensic examiners. The following Top 10 List provides just a few examples of some of the data that can be recovered from an iPhone or Android device:

  1. Social Networking Data
    Sending direct messages on social networking sites might not be the best place to insult your boss or talk behind your friend’s back. In many cases, these messages can be recovered from a smartphone.
  2. Navigation History
    News Flash . . . men ask for directions on their phone. Map searches and driving directions are easily found on these devices.
  3. Web History
    We know what you browsed last summer. Internet browsing history and Google searches are often recovered from iPhone and Android devices.
  4. Text messages
    Deleting a text message does not necessarily mean it is gone forever. Examiners are able to recover deleted messages from certain devices. Think before you text.
  5. Pictures
    A picture is worth a thousand words. Just ask a professional quarterback.
  6. Financial Apps
    Banks aren’t the only ones who know your account numbers and balances. Your smartphone might too. Some bank applications store the individual’s username, account information, and potentially passwords as well.
  7. E-mail
    Find the company leak! E-mail content can be recovered from a smartphone and analyzed to determine whether an employee is sharing confidential data.
  8. GPS Location
    Google and Apple track certain cell tower locations and GPS coordinates, something your mom can’t even do.
  9. Tweets
    Politicians beware: It’s been discovered that direct messages can be recovered from smartphones.
  10. Videos
    Enough said.


"iPhone and iOS Forensics is a must read by all digital forensic examiners, even the most educated person in the iPhone environment will discover something new in this highly valuable book. The author has proven himself many times over to be a valuable resource to the digital community at large, and this book is the culmination of all of that work. I will not conduct another iOS analysis without using this book as my reference!" -Ryan R. Kubasiak, Investigator, Computer Crime Unit and Editor AppleExaminer.com

"Covering iOS file system information, device application and security, acquisition and analysis methods, this book takes one from basic to advanced information and techniques related to the iOS family of devices. Andrew and Katie have put together a valuable resource for security professionals and forensic examiners alike." -Danny Garcia, DG Digital Services, LLC

"This book is an excellent reference for examiners in the field, looking to understand the many different approaches to forensic imaging of an iPhone." -Jonathan Zdziarski, iPhone forensics expert

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.0 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

6 of 6 people found the following review helpful By Eric Huber on July 11, 2011
Format: Paperback Verified Purchase
Andrew Hoog and Katie Strzempka turn out a first class effort as they take the reader through the world of iOS forensics and security. This book is appropriate for digital forensics examiners and incident responders of any level. As an added bonus, the iOS data security coverage makes it a nice option for those who are trying to decide if iOS devices are the right fit for their organization from a security standpoint.

This book provides a comprehensive view of the iOS forensics world. It handles the topic of acquisition in the manner that readers of good digital forensics books would expect. The authors speak clearly and at length about the various options to acquire data using a variety of methods that result in the logical and physical acquisition of data. They also spend an entire chapter on the topic of iOS data security which would likely be of great interest to those who aren't necessarily in the incident response and forensics world, but are interested in learning more about the security ramifications of introducing these devices into their environment. This book not only describes a variety of important security issues such as application security, but also provides recommended methods to best secure these devices.

It was the analytical portion of the book that I found to be the most impressive. The authors put forth an exemplary effort explaining the structure of the operating system and select applications using open source tools. I appreciated that the authors decision to handle the analytical portion of the book using an open source approach rather than teaching it through the prism of the paid tools. At times, this book felt like the iOS version of
...Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By T. Slusher on May 18, 2014
Format: Kindle Edition Verified Purchase
A good book but I would like to see an updated version come out soon. A good read for anyone starting out.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
iPhone and iOS Forensics is the first iOS forensics book I have read. So at this point I have nothing to compare it to. That being said I have already picked up a number of forensic books to read and contrast it with, but none of the currently available books is as up to date as this one.
The book is roughly three hundred pages without the index and ten pages of that are the Appendix A through C. Unlike other books the appendixes are extremely useful. Many times they are a collection of garbage to add pages, but these are quick reference pages for backup locations, useful tools for forensic investigation of iOS, and the system file structure of an iPhone. Which version the structure references I'm not sure, but most likely whatever was the latest at time of writing.
Of the content there were seven total chapters. I found all the chapters extremely helpful with the exception of the largest chapter. Chapter seven was a review of commercial tools available for forensic analysis of an iOS device. While this chapter was somewhat helpful it was a lot of repetitive data that I am not going to apply to use in most day to day forensic analysis cases.
While chapters one through four had very little in the way of forensics they were actually the most useful chapters in my opinion. The first chapter focused the basics of iphone, models, hardware etc.. and then went into the theory of mobile forensics and how to apply it to the rest of the book
Chapter two covered all the basic information that a forensic examiner may or may not already know and how these basic steps that many examiners might take for granted would apply to a potential investigation.
Chapter three covered the basic filesystem and structure of the iOS operating system.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 23 people found the following review helpful By The Professor on February 13, 2013
Format: Paperback Verified Purchase
No clue what to say..bought this as a gift. I didn't even open it, Computer Forensics is not my thing.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images


What Other Items Do Customers Buy After Viewing This Item?