These are the sources and citations used to research Attacker. This bibliography was generated on Cite This For Me on

  • E-book or PDF

    Nessus Professional Datasheet

    2018 - Tenable

    In-text: (Nessus Professional Datasheet, 2018)

    Your Bibliography: 2018. Nessus Professional Datasheet. [ebook] Tenable. Available at: <http://info.tenable.com/rs/934-XQB-568/images/NessusPro__DS__EN_v8.pdf> [Accessed 13 June 2018].

  • Website

    Summarizing The Five Phases of Penetration Testing - Cybrary

    2018 - Cybrary

    In-text: (Summarizing The Five Phases of Penetration Testing - Cybrary, 2018)

    Your Bibliography: Cybrary. 2018. Summarizing The Five Phases of Penetration Testing - Cybrary. [online] Available at: <https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/> [Accessed 6 May 2015].

  • Website

    Dutton, J.

    4 of the 5 top causes of data breaches are because of human or process error

    2018

    In-text: (Dutton, 2018)

    Your Bibliography: Dutton, J., 2018. 4 of the 5 top causes of data breaches are because of human or process error. [online] IT Governance Blog. Available at: <https://www.itgovernance.co.uk/blog/4-of-the-5-top-causes-of-data-breaches-are-because-of-human-or-process-error/> [Accessed 13 May 2018].

  • Website

    Rootkit

    2018 - Wikipedia

    In-text: (Rootkit, 2018)

    Your Bibliography: En.wikipedia.org. 2018. Rootkit. [online] Available at: <https://en.wikipedia.org/wiki/Rootkit> [Accessed 13 June 2018].

  • Website

    Feldman, G.

    Top Five Cyber-Attack Vectors | US Computer Connection

    2016

    In-text: (Feldman, 2016)

    Your Bibliography: Feldman, G., 2016. Top Five Cyber-Attack Vectors | US Computer Connection. [online] US Computer Connection. Available at: <https://www.uscomputer.com/2016/11/23/top-five-cyber-attack-vectors/> [Accessed 13 May 2018].

  • Website

    Lambert, P.

    Security's weakest link: Technology no match for social engineering

    2013

    A security researcher says there is a 100-percent success rate any time pen-testing uses social engineering to target victims.

    In-text: (Lambert, 2013)

    Your Bibliography: Lambert, P., 2013. Security's weakest link: Technology no match for social engineering. [online] TechRepublic. Available at: <https://www.techrepublic.com/blog/it-security/securitys-weakest-link-technology-no-match-for-social-engineering/> [Accessed 13 June 2018].

  • Book

    Lyon, G.

    nmap network scanning

    2010 - Insecure.Com LLC - Sunnyvale, CA

    In-text: (Lyon, 2010)

    Your Bibliography: Lyon, G., 2010. nmap network scanning. Sunnyvale, CA: Insecure.Com LLC.

  • Website

    Nmap: the Network Mapper - Free Security Scanner

    2018

    In-text: (Nmap: the Network Mapper - Free Security Scanner, 2018)

    Your Bibliography: Nmap.org. 2018. Nmap: the Network Mapper - Free Security Scanner. [online] Available at: <https://nmap.org/> [Accessed 13 June 2018].

  • Website

    IT Management Software & Monitoring Tools | SolarWinds

    2018

    In-text: (IT Management Software & Monitoring Tools | SolarWinds, 2018)

    Your Bibliography: Solarwinds.com. 2018. IT Management Software & Monitoring Tools | SolarWinds. [online] Available at: <https://www.solarwinds.com> [Accessed 13 June 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join