These are the sources and citations used to research CRM Bibliography. This bibliography was generated on Cite This For Me on
In-text: (Assuncao, Costanzo and Buyya, 2009)
Your Bibliography: Assuncao, M., Costanzo, A. and Buyya, R., 2009. Evaluating the Cost-Benefit of Using Cloud Computing to Extend the Capacity of Clusters. 1st ed. [ebook] Melbourne: The University of Melbourne. Available at: <http://gridbus.cs.mu.oz.au/~raj/papers/Cloud-HPDC2009.pdf> [Accessed 2 March 2018].
In-text: (Atlassian, 2018)
Your Bibliography: Atlassian, 2018. Server Hardware Requirements Guide - Atlassian Documentation. [online] Confluence.atlassian.com. Available at: <https://confluence.atlassian.com/doc/server-hardware-requirements-guide-30736403.html> [Accessed 1 May 2018].
In-text: (Booth and Anderson, 2018)
Your Bibliography: Booth, T. and Anderson, K., 2018. Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks. 1st ed. [ebook] Lulca: Division of Computer Science, Lulea University of Technology. Available at: <http://www.diva-portal.org/smash/get/diva2:982562/FULLTEXT01.pdf> [Accessed 30 April 2018].
In-text: (Change Activation, 2018)
Your Bibliography: Change Activation, 2018. Change Stakeholder Analysis | Change Activation. [online] Changeactivation.com. Available at: <https://changeactivation.com/modules/change-stakeholder-analysis/> [Accessed 17 March 2018].
In-text: (de Assunção, di Costanzo and Buyya, 2010)
Your Bibliography: de Assunção, M., di Costanzo, A. and Buyya, R., 2010. A cost-benefit analysis of using cloud computing to extend the capacity of clusters. Cluster Computing, [online] 13(3), pp.335-347. Available at: <http://gridbus.csse.unimelb.edu.au/papers/CostBenefitCloud2010.pdf> [Accessed 2 March 2018].
In-text: (Docs.Microsoft, 2017)
Your Bibliography: Docs.Microsoft, 2017. User Account Control security policy settings (Windows 10). [online] Docs.microsoft.com. Available at: <https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings> [Accessed 29 March 2018].
In-text: (Du and Nakao, 2010)
Your Bibliography: Du, P. and Nakao, A., 2010. DDoS defense as a network service. 2010 IEEE Network Operations and Management Symposium - NOMS 2010, [online] Available at: <https://ieeexplore.ieee.org/abstract/document/5488345/> [Accessed 2 April 2018].
In-text: (Grimes, 2001)
Your Bibliography: Grimes, R., 2001. Malicious Mobile Code: Virus Protection for Windows. 1st ed. [ebook] California: O'Reilly Media, p.350. Available at: <https://books.google.co.uk/books?id=GKDtVYJ0wesC&pg=PA350&dq=digitally+signed+code&hl=en&sa=X&ved=0ahUKEwjOv6vXsZLaAhUPElAKHeapAesQ6AEILzAB#v=onepage&q=digitally%20signed%20code&f=true> [Accessed 29 March 2018].
In-text: (Hiatt and Creasey, 2018)
Your Bibliography: Hiatt, J. and Creasey, T., 2018. Change Management: The People Side of Change. 1st ed. [ebook] Parkway: Prosci, p.4. Available at: <https://books.google.co.uk/books?id=zQTy8mk8kZYC&printsec=frontcover&dq=methods+employees+use+to+resist+change&hl=en&sa=X&ved=0ahUKEwj6htbc0OXaAhWrDsAKHb2CBOAQ6AEITTAH#v=onepage&q&f=true> [Accessed 1 May 2018].
In-text: (Inc. Spiceworks, 2018)
Your Bibliography: Inc. Spiceworks, 2018. How to detect installed softwares as pirated,cracked,trial version,freeware etc?. [online] The Spiceworks Community. Available at: <https://community.spiceworks.com/topic/2011053-how-to-detect-installed-softwares-as-pirated-cracked-trial-version-freeware-etc> [Accessed 29 March 2018].
In-text: (Kotter, 2008)
Your Bibliography: Kotter, J., 2008. A Sense of Urgency. 1st ed. [ebook] Brighton: Harvard Business Press. Available at: <https://books.google.co.uk/books?id=gCcL23kKtp0C&printsec=frontcover&dq=Kotter%E2%80%99s+theory&hl=en&sa=X&ved=0ahUKEwiU5PvO7fHZAhVGOpoKHYwNCv4Q6AEINzAD#v=onepage&q&f=false> [Accessed 17 March 2018].
In-text: (Mulholland, 2017)
Your Bibliography: Mulholland, B., 2017. 8 Critical Change Management Models to Evolve and Survive | Process Street. [online] Process Street. Available at: <https://www.process.st/change-management-models/> [Accessed 17 March 2018].
In-text: (Stewart, 2009)
Your Bibliography: Stewart, B., 2009. What Applications Are Installed on the Computers in Your Network?. [online] IT Pro. Available at: <http://www.itprotoday.com/management-mobility/what-applications-are-installed-computers-your-network> [Accessed 29 March 2018].
In-text: (Wade and Shan, 2016)
Your Bibliography: Wade, M. and Shan, J., 2016. Strategies for Responding to Digital Disruption. [online] IMD business school. Available at: <https://www.imd.org/research/insightsimd/strategies-for-responding-to-digital-disruption2/> [Accessed 29 March 2018].
In-text: (Wessel and Christensen, 2012)
Your Bibliography: Wessel, M. and Christensen, C., 2012. Surviving Disruption. [online] Harvard Business Review. Available at: <https://hbr.org/2012/12/surviving-disruption> [Accessed 29 March 2018].
10,587 students joined last month!