Skip to main content

Appendix A—Solutions

  • Chapter
  • First Online:
Guide to Digital Forensics

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 2023 Accesses

Abstract

This chapter lists answers to the review questions from each book chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Reference

  • Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., et al. (2009). Lest we remember: Cold-boot attacks on encryption keys. Communications of the ACM, 52(5), 91–98.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joakim Kävrestad .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Kävrestad, J. (2017). Appendix A—Solutions. In: Guide to Digital Forensics. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-67450-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67450-6_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67449-0

  • Online ISBN: 978-3-319-67450-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics