O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Conventions

In this book, you will find a number of styles of text that distinguish among different kinds of information. Here are some examples of these styles, and explanations of their meanings. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows:

"Compile the source file by simply typing the make command."

A URL is written as follows: http://theiphonewiki.com/wiki/UDID

A pathname is written as follows: /private/var/root/Library/Lockdown/data_ark.plist

Any command-line input or output is written as follows:

$ iproxy 2222 22
 $ ssh usb

New terms and important words are shown in bold. Words that you see on the screen, for example, in menus ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required