Processing Evidence
We have our evidence, so we can begin working on it from within EnCase. This chapter walks you through the steps to get your case created and addresses several of the questions in our case study. We add our evidence to the case and begin looking at the options for processing evidence.
Creating the NIST Hacking Case
The work we’ve done up to this point has been using samples and examples. Now it is time to get started ...

Get Computer Forensics and Digital Investigation with EnCase Forensic v7 now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.