The document discusses e-mail forensics. It begins by describing the architecture of e-mail systems, including mail user agents, message stores, mail submission and transfer agents, and mail delivery agents. It then discusses common e-mail client attacks like malware distribution, phishing, spam, and denial-of-service attacks. The document outlines techniques for e-mail forensic investigation such as header analysis and server investigation. It also presents tools that can be used for e-mail forensics and summarizes a research paper on detecting e-mail date and time spoofing through analysis of header fields.