Digital Forensics Magazine

Back issues of Digital Forensics Magazine can be purchased at the site, as can annual subscriptions.
Follow this link to the product pages of DFM (will open a new window)

issue25

Issue 25 - Published Feb 2016

  • Trapping the Attacker
  • Anti Virus Evasion
  • Heuristic Based Scanning
  • Digital Forensic Readiness Revisited
issue24

Issue 24 - Published Nov 2015

  • Trapping the Attacker
  • HUMINT
  • Bloom Filters
  • Digital Profiling
issue23

Issue 23 - Published Aug 2015

  • Criminal Journey Mapping
  • Honeynets
  • Focus on the SOC
  • DNA and Bioinformatics
issue22

Issue 22 - Published May 2015

  • SQLite Databases Part 2
  • Improving Smart Phone Investigation Methods
  • Internet-of-Things: Towards a Forensic Methodology
  • Drilling Into The Big Data Goldmine
issue21

Issue 21 - Published Feb 2015

  • SQLite Databases Part 1
  • Improving Image Recovery Rates In Big Data
  • Recovering Cryptographic Keys From Memory
  • Forensics In The World Of Cyber Physical Systems
issue20

Issue 20 - Published Nov 2014

  • Cyber Physical Systems
  • Recovering User Passwords From Memory
  • Mac Memory Forensics
  • Programming the Wetware
issue19

Issue 19 - Published Aug 2014

  • What Are The Core Skills For Cyber
  • NTP DDOS
  • Session Spoofing Attempts On The Xbox
  • Harvesting Windows Credentials From Volatile Storage
issue18

Issue 18 - Published May 2014

  • Beyond Timelines - Anchos in Relative Time
  • Forensic Readiness
  • Android Security
  • Using Fuzzy Hashes For Malware Classification

A First From TR Media!

iOS Forensic Analysis by Sean Morrissey and Tony Campbell
Published by Apress

iOS Forensics

iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With iOS information never published before and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community.

What you’ll learn:

  • How to respond to security incidents involving iOS devices
  • How to acquire and analyze data on iOS devices such as iPhone and iPad
  • How to analyze media exploitation on iOS devices

Who this book is for:
Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators. This book can also be employed by law enforcement training academies, universities, as well as computer forensic, information security, and e-discovery communities.

DON'T WAIT - ORDER YOUR COPY OF iOS FORENSIC ANALYSIS NOW!