Chapter 6 Hardware Forensics
Chapter 7 Hidden Files and Antiforensics
Chapter 8 Network Forensics
Chapter 9 Virtual Systems
Chapter 10 Mobile Forensics