Table of Contents

Introduction

Chapter 1: The Scope of Computer Forensics

Chapter 2: Windows Operating and File Systems

Chapter 3: Handling Computer Hardware

Chapter 4: Acquiring Evidence in a Computer Forensics Lab

Chapter 5: Online Investigations

Chapter 6: Documenting the Investigation

Chapter 7: Admissibility of Digital Evidence

Chapter 8: Network Forensics

Chapter 9: Mobile Forensics

Chapter 10: Photograph Forensics

Chapter 11: Mac Forensics

Chapter 12: Case Studies