TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
I read the book Techno Security's Guide to E-Discovery & Digital Forensics by Jack Wiles to research this post, which is an excellent book which I bought from kindle. This book is a great introduction to the field of digital forensics although it's done from an american perspective & I am english. It even suggests the equipment and software you need if you are just starting out. It's a shame there isn't a section suggesting open source software you can use although I think most laboratories use software like paraben & encase which are commercial software. There is an extensive section in this book on how people retrieve other users passwords. You can enter a term like shoulder surfing or war driving into google and finds lots of examples. If you are a commercial organisation your biggest threat comes from disgruntled employees. If they want to do serious damage they will try to find the administrators password. A lot of potential trouble makers just watch as he is typing in his password and try to memorize it. Thankfully your password isn't displayed when you type it. Sometimes people put a keylogger either in the form of software or hardware to capture passwords and user names. Your user name should be difficult to guess if possible and is another line of defence. A hacker can usually crack your password in a few hours but if he has to try and work out your user name as well hopefully he will give up. If someone is trying to crack your password by war driving you will see a list of failed attempts to access your account in the event viewer.