Appendix B | part of Digital Data Integrity: The Evolution from Passive Protection to Active Management | Wiley Telecom books | IEEE Xplore