O'Reilly logo

Computer Forensics and Digital Investigation with EnCase Forensic v7 by Suzanne Widup

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER
5
image
Processing Evidence
We have our evidence, so we can begin working on it from within EnCase. This chapter walks you through the steps to get your case created and addresses several of the questions in our case study. We add our evidence to the case and begin looking at the options for processing evidence.
image
image
Creating the NIST Hacking Case
The work we’ve done up to this point has been using samples and examples. Now it is time to get started ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required