O'Reilly logo

iPhone and iOS Forensics by Katie Strzempka, Andrew Hoog

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. iPhone and iPad data security
Chapter points:
• Data Security and Testing
• Application Security
• Recommendations for Device and Application Security
Selecting a smart phone for use within a corporation can be a daunting task because each platform contains its own benefits as well as vulnerabilities. Corporations are seeking a device that carries unique features including, more importantly, security. In this chapter on iPhone and iPad data security, mobile device administrators within companies are provided options for the protection of user data. The reader is walked through the process involved in the testing of these Apple devices in an effort to determine what type of sensitive data can be recovered from such devices. Also covered ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required