Who this book is for
This book is intended mainly for a technical audience, and, more specifically, for forensic analysts (or digital investigators) who need to acquire and analyze information from mobile devices running iOS.
This book is also useful for computer security experts and penetration testers because it addresses some issues that definitely must be taken into consideration before the deployment of this type of mobile device in business environments or situations where data security is a necessary condition. Finally, this book could also be of interest to developers of mobile applications, and they can learn what data is stored on these devices, and where the application is used. Thus, they will be able to improve security.