A clear investigative guide to understanding breach logs, spotting attackers, and reconstructing cyber incidents from raw technical records.