Abstract
This chapter lists answers to the review questions from each book chapter.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Reference
Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., et al. (2009). Lest we remember: Cold-boot attacks on encryption keys. Communications of the ACM, 52(5), 91–98.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Kävrestad, J. (2017). Appendix A—Solutions. In: Guide to Digital Forensics. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-67450-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-67450-6_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67449-0
Online ISBN: 978-3-319-67450-6
eBook Packages: Computer ScienceComputer Science (R0)