Chapter 13 Incident and Intrusion Response 250
Chapter 14 Trends and Future Directions 270
Chapter 15 System Forensics Resources 289