![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5ZXJ7NqFSqlliu1RuiCSS62IygmhVAQteVazK5y8W2gPswww2BGluiT1Mrgr-_MZKl3-oSS3gN7gMIB6g6KNoz75cidtEr36Y3rKNoHZ-9oRawpb8LJmO1ayJFeV0PuqSgaaehJmPMC2F/s320/CHFI+5.jpg)
Investigating Wireless Networks and Devices discusses how to investigate wireless attacks, as well as PDA, iPod, iPhone, and BlackBerry forensics.
Chapter 1, Investigating Wireless Attacks, discusses various types of wireless technologies available, the types of attacks launched against them, and how to investigate these attacks.
Chapter 2, PDA Forensics, provides an understanding of what is stored on PDAs and the associated security issues. It also includes a discussion on PDA forensic tools and how to implement countermeasures.
Chapter 3, iPod and iPhone Forensics, focuses on how data stored on these devices and this data can be retrieved.
Chapter 4, BlackBerry Forensics, discusses how the device works, ways to increase its security, and what to do if it must be taken as evidence.