Author: Richard Lai
Publisher: MIT Press
ISBN: 0262313014
Category : Business & Economics
Languages : en
Pages : 333
Book Description
Powerful tools for using operations metrics to analyze companies in ways that go beyond traditional financial models and statements. Investors and analysts often need to look into a firm's operations more deeply than traditional financial statements and models allow. This book describes newly developed tools for using operations metrics to discern and influence the valuation of a firm. It is the first to present these techniques from a unified perspective: that of operations forensics, which looks at operations management not from the traditional point of view of a manager but from that of an investor or shareholder. After a discussion of financial statements and the useful but incomplete insights they provide, the book covers the three components of operations forensics: operational indicators, operations details that can predict future performance; operational due diligence, methods for verifying companies' claims about operational excellence and valuing their operational assets; and operational turnaround, an innovative approach to buyout and turnaround strategies. The text also offers brief reviews of operations management concepts, real-world examples of operations forensics, and a glossary. The mathematical material gradually increases in sophistication as the book progresses (but can be skipped without loss of continuity). Each chapter concludes with a “Takeaways and Toolkit” section, a brief summary of prior research, and suggestions for further reading. Operations forensics offers powerful tools and frameworks for financial analysts, private equity firms, managers, and consultants. This book provides a valuable resource for MBA students and practitioners. Downloadable supplementary material for instructors incudes figures form the text and 42 slides that can be used for class presentations.
Operations Forensics
Author: Richard Lai
Publisher: MIT Press
ISBN: 0262313014
Category : Business & Economics
Languages : en
Pages : 333
Book Description
Powerful tools for using operations metrics to analyze companies in ways that go beyond traditional financial models and statements. Investors and analysts often need to look into a firm's operations more deeply than traditional financial statements and models allow. This book describes newly developed tools for using operations metrics to discern and influence the valuation of a firm. It is the first to present these techniques from a unified perspective: that of operations forensics, which looks at operations management not from the traditional point of view of a manager but from that of an investor or shareholder. After a discussion of financial statements and the useful but incomplete insights they provide, the book covers the three components of operations forensics: operational indicators, operations details that can predict future performance; operational due diligence, methods for verifying companies' claims about operational excellence and valuing their operational assets; and operational turnaround, an innovative approach to buyout and turnaround strategies. The text also offers brief reviews of operations management concepts, real-world examples of operations forensics, and a glossary. The mathematical material gradually increases in sophistication as the book progresses (but can be skipped without loss of continuity). Each chapter concludes with a “Takeaways and Toolkit” section, a brief summary of prior research, and suggestions for further reading. Operations forensics offers powerful tools and frameworks for financial analysts, private equity firms, managers, and consultants. This book provides a valuable resource for MBA students and practitioners. Downloadable supplementary material for instructors incudes figures form the text and 42 slides that can be used for class presentations.
Publisher: MIT Press
ISBN: 0262313014
Category : Business & Economics
Languages : en
Pages : 333
Book Description
Powerful tools for using operations metrics to analyze companies in ways that go beyond traditional financial models and statements. Investors and analysts often need to look into a firm's operations more deeply than traditional financial statements and models allow. This book describes newly developed tools for using operations metrics to discern and influence the valuation of a firm. It is the first to present these techniques from a unified perspective: that of operations forensics, which looks at operations management not from the traditional point of view of a manager but from that of an investor or shareholder. After a discussion of financial statements and the useful but incomplete insights they provide, the book covers the three components of operations forensics: operational indicators, operations details that can predict future performance; operational due diligence, methods for verifying companies' claims about operational excellence and valuing their operational assets; and operational turnaround, an innovative approach to buyout and turnaround strategies. The text also offers brief reviews of operations management concepts, real-world examples of operations forensics, and a glossary. The mathematical material gradually increases in sophistication as the book progresses (but can be skipped without loss of continuity). Each chapter concludes with a “Takeaways and Toolkit” section, a brief summary of prior research, and suggestions for further reading. Operations forensics offers powerful tools and frameworks for financial analysts, private equity firms, managers, and consultants. This book provides a valuable resource for MBA students and practitioners. Downloadable supplementary material for instructors incudes figures form the text and 42 slides that can be used for class presentations.
Operations Forensics
Author: Richard Lai
Publisher:
ISBN: 9780262018661
Category : Industrial management
Languages : en
Pages : 0
Book Description
Powerful tools for using operations metrics to analyze companies in ways that go beyond traditional financial models and statements. Investors and analysts often need to look into a firm's operations more deeply than traditional financial statements and models allow. This book describes newly developed tools for using operations metrics to discern and influence the valuation of a firm. It is the first to present these techniques from a unified perspective: that of operations forensics, which looks at operations management not from the traditional point of view of a manager but from that of an investor or shareholder. After a discussion of financial statements and the useful but incomplete insights they provide, the book covers the three components of operations forensics: operational indicators, operations details that can predict future performance; operational due diligence, methods for verifying companies' claims about operational excellence and valuing their operational assets; and operational turnaround, an innovative approach to buyout and turnaround strategies. The text also offers brief reviews of operations management concepts, real-world examples of operations forensics, and a glossary. The mathematical material gradually increases in sophistication as the book progresses (but can be skipped without loss of continuity). Each chapter concludes with a "Takeaways and Toolkit" section, a brief summary of prior research, and suggestions for further reading. Operations forensics offers powerful tools and frameworks for financial analysts, private equity firms, managers, and consultants. This book provides a valuable resource for MBA students and practitioners. Downloadable supplementary material for instructors incudes figures form the text and 42 slides that can be used for class presentations.
Publisher:
ISBN: 9780262018661
Category : Industrial management
Languages : en
Pages : 0
Book Description
Powerful tools for using operations metrics to analyze companies in ways that go beyond traditional financial models and statements. Investors and analysts often need to look into a firm's operations more deeply than traditional financial statements and models allow. This book describes newly developed tools for using operations metrics to discern and influence the valuation of a firm. It is the first to present these techniques from a unified perspective: that of operations forensics, which looks at operations management not from the traditional point of view of a manager but from that of an investor or shareholder. After a discussion of financial statements and the useful but incomplete insights they provide, the book covers the three components of operations forensics: operational indicators, operations details that can predict future performance; operational due diligence, methods for verifying companies' claims about operational excellence and valuing their operational assets; and operational turnaround, an innovative approach to buyout and turnaround strategies. The text also offers brief reviews of operations management concepts, real-world examples of operations forensics, and a glossary. The mathematical material gradually increases in sophistication as the book progresses (but can be skipped without loss of continuity). Each chapter concludes with a "Takeaways and Toolkit" section, a brief summary of prior research, and suggestions for further reading. Operations forensics offers powerful tools and frameworks for financial analysts, private equity firms, managers, and consultants. This book provides a valuable resource for MBA students and practitioners. Downloadable supplementary material for instructors incudes figures form the text and 42 slides that can be used for class presentations.
Operating System Forensics
Author: Ric Messier
Publisher: Syngress
ISBN: 0128019638
Category : Computers
Languages : en
Pages : 388
Book Description
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book. - Covers digital forensic investigations of the three major operating systems, including Windows, Linux, and Mac OS - Presents the technical details of each operating system, allowing users to find artifacts that might be missed using automated tools - Hands-on exercises drive home key concepts covered in the book. - Includes discussions of cloud, Internet, and major mobile operating systems such as Android and iOS
Publisher: Syngress
ISBN: 0128019638
Category : Computers
Languages : en
Pages : 388
Book Description
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book. - Covers digital forensic investigations of the three major operating systems, including Windows, Linux, and Mac OS - Presents the technical details of each operating system, allowing users to find artifacts that might be missed using automated tools - Hands-on exercises drive home key concepts covered in the book. - Includes discussions of cloud, Internet, and major mobile operating systems such as Android and iOS
Digital Forensics Processing and Procedures
Author: David Lilburn Watson
Publisher: Newnes
ISBN: 1597497452
Category : Computers
Languages : en
Pages : 914
Book Description
This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. - A step-by-step guide to designing, building and using a digital forensics lab - A comprehensive guide for all roles in a digital forensics laboratory - Based on international standards and certifications
Publisher: Newnes
ISBN: 1597497452
Category : Computers
Languages : en
Pages : 914
Book Description
This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. - A step-by-step guide to designing, building and using a digital forensics lab - A comprehensive guide for all roles in a digital forensics laboratory - Based on international standards and certifications
Handbook of Digital Forensics and Investigation
Author: Eoghan Casey
Publisher: Academic Press
ISBN: 0080921477
Category : Computers
Languages : en
Pages : 594
Book Description
Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). This handbook is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds*Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms*Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations
Publisher: Academic Press
ISBN: 0080921477
Category : Computers
Languages : en
Pages : 594
Book Description
Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field. It is also designed as an accompanying text to Digital Evidence and Computer Crime. This unique collection details how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative Methodology section of the Handbook provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Intrusion Investigation. The Technology section is extended and updated to reflect the state of the art in each area of specialization. The main areas of focus in the Technology section are forensic analysis of Windows, Unix, Macintosh, and embedded systems (including cellular telephones and other mobile devices), and investigations involving networks (including enterprise environments and mobile telecommunications technology). This handbook is an essential technical reference and on-the-job guide that IT professionals, forensic practitioners, law enforcement, and attorneys will rely on when confronted with computer related crime and digital evidence of any kind. *Provides methodologies proven in practice for conducting digital investigations of all kinds*Demonstrates how to locate and interpret a wide variety of digital evidence, and how it can be useful in investigations *Presents tools in the context of the investigative process, including EnCase, FTK, ProDiscover, foremost, XACT, Network Miner, Splunk, flow-tools, and many other specialized utilities and analysis platforms*Case examples in every chapter give readers a practical understanding of the technical, logistical, and legal challenges that arise in real investigations
Mastering Red Team Operations
Author: Cybellium Ltd
Publisher: Cybellium Ltd
ISBN:
Category : Computers
Languages : en
Pages : 166
Book Description
Cybellium Ltd is dedicated to empowering individuals and organizations with the knowledge and skills they need to navigate the ever-evolving computer science landscape securely and learn only the latest information available on any subject in the category of computer science including: - Information Technology (IT) - Cyber Security - Information Security - Big Data - Artificial Intelligence (AI) - Engineering - Robotics - Standards and compliance Our mission is to be at the forefront of computer science education, offering a wide and comprehensive range of resources, including books, courses, classes and training programs, tailored to meet the diverse needs of any subject in computer science. Visit https://www.cybellium.com for more books.
Publisher: Cybellium Ltd
ISBN:
Category : Computers
Languages : en
Pages : 166
Book Description
Cybellium Ltd is dedicated to empowering individuals and organizations with the knowledge and skills they need to navigate the ever-evolving computer science landscape securely and learn only the latest information available on any subject in the category of computer science including: - Information Technology (IT) - Cyber Security - Information Security - Big Data - Artificial Intelligence (AI) - Engineering - Robotics - Standards and compliance Our mission is to be at the forefront of computer science education, offering a wide and comprehensive range of resources, including books, courses, classes and training programs, tailored to meet the diverse needs of any subject in computer science. Visit https://www.cybellium.com for more books.
Financial Forensics Body of Knowledge
Author: Darrell D. Dorrell
Publisher: John Wiley & Sons
ISBN: 1118218981
Category : Business & Economics
Languages : en
Pages : 560
Book Description
The definitive, must-have guide for the forensic accounting professional Financial Forensics Body of Knowledge is the unique, innovative, and definitive guide and technical reference work for the financial forensics and/or forensic accounting professional, including nearly 300 forensic tools, techniques, methods and methodologies apply to virtually all civil, criminal and dispute matters. Many of the tools have never before been published. It defines the profession: "The Art & Science of Investigating People & Money." It defines Forensic Operators: "...financial forensics-capable personnel... possess unique and specific skills, knowledge, experience, education, training, and integrity to function in the financial forensics discipline." It defines why: "If you understand financial forensics you understand fraud, but not vice versa" by applying financial forensics to all aspects of the financial community. It contains a book-within-a-book Companion Section for financial valuation and litigation specialists. It defines foundational financial forensics/forensic accounting methodologies: FAIM, Forensic Accounting Investigation Methodology, ICE/SCORE, CICO, APD, forensic lexicology, and others. It contains a Reader Lookup Table that permits everyone in the financial community to immediately focus on the pertinent issues.
Publisher: John Wiley & Sons
ISBN: 1118218981
Category : Business & Economics
Languages : en
Pages : 560
Book Description
The definitive, must-have guide for the forensic accounting professional Financial Forensics Body of Knowledge is the unique, innovative, and definitive guide and technical reference work for the financial forensics and/or forensic accounting professional, including nearly 300 forensic tools, techniques, methods and methodologies apply to virtually all civil, criminal and dispute matters. Many of the tools have never before been published. It defines the profession: "The Art & Science of Investigating People & Money." It defines Forensic Operators: "...financial forensics-capable personnel... possess unique and specific skills, knowledge, experience, education, training, and integrity to function in the financial forensics discipline." It defines why: "If you understand financial forensics you understand fraud, but not vice versa" by applying financial forensics to all aspects of the financial community. It contains a book-within-a-book Companion Section for financial valuation and litigation specialists. It defines foundational financial forensics/forensic accounting methodologies: FAIM, Forensic Accounting Investigation Methodology, ICE/SCORE, CICO, APD, forensic lexicology, and others. It contains a Reader Lookup Table that permits everyone in the financial community to immediately focus on the pertinent issues.
Malware Forensics
Author: Eoghan Casey
Publisher: Syngress
ISBN: 0080560199
Category : Computers
Languages : en
Pages : 713
Book Description
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. It is the first book detailing how to perform live forensic techniques on malicious code. The book gives deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. It explores over 150 different tools for malware incident response and analysis, including forensic tools for preserving and analyzing computer memory. Readers from all educational and technical backgrounds will benefit from the clear and concise explanations of the applicable legal case law and statutes covered in every chapter. In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter. This book is intended for system administrators, information security professionals, network personnel, forensic examiners, attorneys, and law enforcement working with the inner-workings of computer memory and malicious code. - Winner of Best Book Bejtlich read in 2008! - http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html - Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader - First book to detail how to perform "live forensic" techniques on malicous code - In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter
Publisher: Syngress
ISBN: 0080560199
Category : Computers
Languages : en
Pages : 713
Book Description
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. It is the first book detailing how to perform live forensic techniques on malicious code. The book gives deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. It explores over 150 different tools for malware incident response and analysis, including forensic tools for preserving and analyzing computer memory. Readers from all educational and technical backgrounds will benefit from the clear and concise explanations of the applicable legal case law and statutes covered in every chapter. In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter. This book is intended for system administrators, information security professionals, network personnel, forensic examiners, attorneys, and law enforcement working with the inner-workings of computer memory and malicious code. - Winner of Best Book Bejtlich read in 2008! - http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html - Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader - First book to detail how to perform "live forensic" techniques on malicous code - In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter
Forensic Systems Engineering
Author: William A. Stimson
Publisher: John Wiley & Sons
ISBN: 1119422752
Category : Technology & Engineering
Languages : en
Pages : 352
Book Description
A systems-level approach to reducing liability through process improvement Forensic Systems Analysis: Evaluating Operations by Discovery presents a systematic framework for uncovering and resolving problematic process failures. Carefully building the causal relationship from process to product, the discussion lays out in significant detail the appropriate and tactical approaches necessary to the pursuit of litigation with respect to corporate operations. Systemic process failures are addressed by flipping process improvement models to study both improvement and failure, resulting in arguments and methodologies relevant to any product or service industry. Guidance on risk analysis of operations combines evaluation of process control, stability, capability, verification, validation, specification, product reliability, serial dependence, and more, providing a robust framework with which to target large-scale nonconforming products and services. Relevant to anyone involved in business, manufacturing, service, and control, this book: Covers process liability and operations management from both engineering and legal perspectives Offers analyses that present novel uses of traditional engineering methods concerning risk and product quality and reliability Takes a rigorous approach to system tactics and constraints related to product and service operations and identifies dysfunctional processes Offers both prescriptive and descriptive solutions to both the plaintiff and the defendant The global economy has created an environment in which huge production volume, complex data bases, and multiple dispersed suppliers greatly challenge industrial operations. This informative guide provides a practical blueprint for uncovering problematic process failures.
Publisher: John Wiley & Sons
ISBN: 1119422752
Category : Technology & Engineering
Languages : en
Pages : 352
Book Description
A systems-level approach to reducing liability through process improvement Forensic Systems Analysis: Evaluating Operations by Discovery presents a systematic framework for uncovering and resolving problematic process failures. Carefully building the causal relationship from process to product, the discussion lays out in significant detail the appropriate and tactical approaches necessary to the pursuit of litigation with respect to corporate operations. Systemic process failures are addressed by flipping process improvement models to study both improvement and failure, resulting in arguments and methodologies relevant to any product or service industry. Guidance on risk analysis of operations combines evaluation of process control, stability, capability, verification, validation, specification, product reliability, serial dependence, and more, providing a robust framework with which to target large-scale nonconforming products and services. Relevant to anyone involved in business, manufacturing, service, and control, this book: Covers process liability and operations management from both engineering and legal perspectives Offers analyses that present novel uses of traditional engineering methods concerning risk and product quality and reliability Takes a rigorous approach to system tactics and constraints related to product and service operations and identifies dysfunctional processes Offers both prescriptive and descriptive solutions to both the plaintiff and the defendant The global economy has created an environment in which huge production volume, complex data bases, and multiple dispersed suppliers greatly challenge industrial operations. This informative guide provides a practical blueprint for uncovering problematic process failures.
System Forensics, Investigation, and Response
Author: Chuck Easttom
Publisher: Jones & Bartlett Learning
ISBN: 1284154793
Category : Computers
Languages : en
Pages : 355
Book Description
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of system forensics.
Publisher: Jones & Bartlett Learning
ISBN: 1284154793
Category : Computers
Languages : en
Pages : 355
Book Description
Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! System Forensics, Investigation, and Response, Third Edition examines the fundamentals concepts readers must know as they prepare for a career in the cutting-edge field of system forensics.