Table of Contents:
- Introduction
- Names and numbers
- Obfuscation
- Web sites
- Web servers
- Web browsers
- File contents
- People and places
- Patterns of activity
- Case studies
- Taking action.


