Chapter 1: Network Investigation OverviewChapter 2: The Microsoft Network StructureChapter 3: Beyond the Windows GUIChapter 4: Windows Password IssuesChapter 5: Windows Ports and ServicesChapter 6: Live-Analysis TechniquesChapter 7: Windows FilesystemsChapter 8: The Registry StructureChapter 9: Registry EvidenceChapter 10: Introduction to MalwareChapter 11: Text-Based LogsChapter 12: Windows Event LogsChapter 13: Logon and Account Logon EventsChapter 14: Other Audit EventsChapter 15: Forensic Analysis of Event LogsChapter 16: Presenting the ResultsChapter 17: The Challenges of Cloud Computing and Virtualization