Information security week 6

How does Computer Forensics differ from data recovery?