ABSTRACT

In this chapter, we will introduce you to the tools we use to process the data collected, in the previous chapter, for leads. I should caution you here that we cannot cover everything in the depth that a work devoted to forensic computer science could. However, I will introduce the tools, their use, and a bit of the specific hands-on procedure you need for each of them.