The purpose of this book, one of the first to tackle this complex subject, is to provide a sufficient depth of technical understanding so that forensic computing analysis can search for, find and most importantly of all, present any form of digital document as admissible evidence in a court of law. Tony Sammes and Brian Jenkinson show how information held in computer systems can be recovered and how it may be deliberately hidden or subverted for criminal purposes.