Role of the Forensic Examiner in the Judicial System
Chapter 2. Key Technical Concepts
Bits, Bytes, and Numbering Schemes
File Extensions and File Signatures
Allocated and Unallocated Space
How Magnetic Hard Drives Store Data
Basic Computer Function—Putting it All Together
Chapter 4. Collecting Evidence
Crime Scenes and Collecting Evidence
Live System versus Dead System
Chapter 5. Windows System Artifacts
Hibernation File (Hiberfile.Sys)
Restore Points and Shadow Copy
Criminal Law—Searches Without a Warrant
Electronic Discovery (eDiscovery)
Chapter 8. Internet and E-Mail
Web Browsers—Internet Explorer
Network Evidence and Investigations
Chapter 10. Mobile Device Forensics
Global Positioning Systems (GPS)
Cloud Forensics (Finding/Identifying Potential Evidence Stored In the Cloud)