Table of Contents
Chapter 1 - The Initial Contact
Chapter 2 - Client Site Arrival
Chapter 3 - Evidence Collection Procedures
Chapter 4 - Evidence Collection and Analysis Tools
Chapter 5 - Access Data's Forensic Toolkit
Chapter 6 - Guidance Software's EnCase
Chapter 7 - ILook Investigator
Chapter 8 - Password Recovery
Chapter 9 - Questions & Answers by Subject Area
Chapter 10 - Recommended Reference Materials
Chapter 11 - Case Study
Chapter 12 - Rail Transportation
Chapter 13 - Transhumanism and Robotics
Chapter 14 - Memory & Incident Response System Commands
Chapter 15 - Making use of Open-Source Intelligence (OSINT)
Appendix A - Glossary
Appendix B - Port Numbers Used by Malicious Trojan Horse Programs
Appendix C - Attack Signatures
Appendix D - UNIX & Linux Commands
Appendix E - Cisco Firewall Commands
Appendix F - Discovering Unauthorized Access to Your Computer
Appendix G - Electromagnetic Field Analysis (EFA)
Appendix H - The Intelligence Community since 9-11
Appendix I - Answers to Chapter Questions