›› 2013, Vol. 13 ›› Issue (11): 0-0.
• 信息网络安全 •
刘琼;叶猛
LIU Qiong%YE Meng
摘要: In view of the current shortage of the methods that extract the iPhone data and recover the deleted data, this paper proposes three kinds of method to get the iPhone user system and application data. Combining with SQLite internal mechanism, the paper pro