CHAPTER 5 System Forensics Technologies 82
CHAPTER 6 Controlling a Forensic Investigation 108
CHAPTER 7 Collecting, Seizing, and Protecting Evidence 130
CHAPTER 8 Understanding Information-Hiding Techniques 148
CHAPTER 9 Recovering Data 170
CHAPTER 10 Investigating and Scrutinizing E-mail 189
CHAPTER 11 Performing Network Analysis 207
CHAPTER 12 Searching Memory in Real Time with Live System Forensics 228