These are the sources and citations used to research CRM Bibliography. This bibliography was generated on Cite This For Me on

  • E-book or PDF

    Assuncao, M. D. D., Costanzo, A. D. and Buyya, R.

    Evaluating the Cost-Benefit of Using Cloud Computing to Extend the Capacity of Clusters

    2009 - The University of Melbourne - Melbourne

    In-text: (Assuncao, Costanzo and Buyya, 2009)

    Your Bibliography: Assuncao, M., Costanzo, A. and Buyya, R., 2009. Evaluating the Cost-Benefit of Using Cloud Computing to Extend the Capacity of Clusters. 1st ed. [ebook] Melbourne: The University of Melbourne. Available at: <http://gridbus.cs.mu.oz.au/~raj/papers/Cloud-HPDC2009.pdf> [Accessed 2 March 2018].

  • Website

    Atlassian

    Server Hardware Requirements Guide - Atlassian Documentation

    2018

    In-text: (Atlassian, 2018)

    Your Bibliography: Atlassian, 2018. Server Hardware Requirements Guide - Atlassian Documentation. [online] Confluence.atlassian.com. Available at: <https://confluence.atlassian.com/doc/server-hardware-requirements-guide-30736403.html> [Accessed 1 May 2018].

  • E-book or PDF

    Booth, T. and Anderson, K.

    Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks

    2018 - Division of Computer Science, Lulea University of Technology - Lulca

    In-text: (Booth and Anderson, 2018)

    Your Bibliography: Booth, T. and Anderson, K., 2018. Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks. 1st ed. [ebook] Lulca: Division of Computer Science, Lulea University of Technology. Available at: <http://www.diva-portal.org/smash/get/diva2:982562/FULLTEXT01.pdf> [Accessed 30 April 2018].

  • Website

    Change Activation

    Change Stakeholder Analysis | Change Activation

    2018

    In-text: (Change Activation, 2018)

    Your Bibliography: Change Activation, 2018. Change Stakeholder Analysis | Change Activation. [online] Changeactivation.com. Available at: <https://changeactivation.com/modules/change-stakeholder-analysis/> [Accessed 17 March 2018].

  • Journal

    de Assunção, M. D., di Costanzo, A. and Buyya, R.

    A cost-benefit analysis of using cloud computing to extend the capacity of clusters

    2010 - Cluster Computing

    In-text: (de Assunção, di Costanzo and Buyya, 2010)

    Your Bibliography: de Assunção, M., di Costanzo, A. and Buyya, R., 2010. A cost-benefit analysis of using cloud computing to extend the capacity of clusters. Cluster Computing, [online] 13(3), pp.335-347. Available at: <http://gridbus.csse.unimelb.edu.au/papers/CostBenefitCloud2010.pdf> [Accessed 2 March 2018].

  • Website

    Docs.Microsoft

    User Account Control security policy settings (Windows 10)

    2017

    In-text: (Docs.Microsoft, 2017)

    Your Bibliography: Docs.Microsoft, 2017. User Account Control security policy settings (Windows 10). [online] Docs.microsoft.com. Available at: <https://docs.microsoft.com/en-us/windows/security/identity-protection/user-account-control/user-account-control-security-policy-settings> [Accessed 29 March 2018].

  • Journal

    Du, P. and Nakao, A.

    DDoS defense as a network service

    2010 - 2010 IEEE Network Operations and Management Symposium - NOMS 2010

    In-text: (Du and Nakao, 2010)

    Your Bibliography: Du, P. and Nakao, A., 2010. DDoS defense as a network service. 2010 IEEE Network Operations and Management Symposium - NOMS 2010, [online] Available at: <https://ieeexplore.ieee.org/abstract/document/5488345/> [Accessed 2 April 2018].

  • E-book or PDF

    Grimes, R.

    Malicious Mobile Code: Virus Protection for Windows

    2001 - O'Reilly Media - California

    In-text: (Grimes, 2001)

    Your Bibliography: Grimes, R., 2001. Malicious Mobile Code: Virus Protection for Windows. 1st ed. [ebook] California: O'Reilly Media, p.350. Available at: <https://books.google.co.uk/books?id=GKDtVYJ0wesC&pg=PA350&dq=digitally+signed+code&hl=en&sa=X&ved=0ahUKEwjOv6vXsZLaAhUPElAKHeapAesQ6AEILzAB#v=onepage&q=digitally%20signed%20code&f=true> [Accessed 29 March 2018].

  • E-book or PDF

    Hiatt, J. and Creasey, T. J.

    Change Management: The People Side of Change

    2018 - Prosci - Parkway

    In-text: (Hiatt and Creasey, 2018)

    Your Bibliography: Hiatt, J. and Creasey, T., 2018. Change Management: The People Side of Change. 1st ed. [ebook] Parkway: Prosci, p.4. Available at: <https://books.google.co.uk/books?id=zQTy8mk8kZYC&printsec=frontcover&dq=methods+employees+use+to+resist+change&hl=en&sa=X&ved=0ahUKEwj6htbc0OXaAhWrDsAKHb2CBOAQ6AEITTAH#v=onepage&q&f=true> [Accessed 1 May 2018].

  • Website

    Inc. Spiceworks

    How to detect installed softwares as pirated,cracked,trial version,freeware etc?

    2018

    In-text: (Inc. Spiceworks, 2018)

    Your Bibliography: Inc. Spiceworks, 2018. How to detect installed softwares as pirated,cracked,trial version,freeware etc?. [online] The Spiceworks Community. Available at: <https://community.spiceworks.com/topic/2011053-how-to-detect-installed-softwares-as-pirated-cracked-trial-version-freeware-etc> [Accessed 29 March 2018].

  • E-book or PDF

    Kotter, J. P.

    A Sense of Urgency

    2008 - Harvard Business Press - Brighton

    In-text: (Kotter, 2008)

    Your Bibliography: Kotter, J., 2008. A Sense of Urgency. 1st ed. [ebook] Brighton: Harvard Business Press. Available at: <https://books.google.co.uk/books?id=gCcL23kKtp0C&printsec=frontcover&dq=Kotter%E2%80%99s+theory&hl=en&sa=X&ved=0ahUKEwiU5PvO7fHZAhVGOpoKHYwNCv4Q6AEINzAD#v=onepage&q&f=false> [Accessed 17 March 2018].

  • Website

    Mulholland, B.

    8 Critical Change Management Models to Evolve and Survive | Process Street

    2017

    In-text: (Mulholland, 2017)

    Your Bibliography: Mulholland, B., 2017. 8 Critical Change Management Models to Evolve and Survive | Process Street. [online] Process Street. Available at: <https://www.process.st/change-management-models/> [Accessed 17 March 2018].

  • Website

    Stewart, B.

    What Applications Are Installed on the Computers in Your Network?

    2009

    In-text: (Stewart, 2009)

    Your Bibliography: Stewart, B., 2009. What Applications Are Installed on the Computers in Your Network?. [online] IT Pro. Available at: <http://www.itprotoday.com/management-mobility/what-applications-are-installed-computers-your-network> [Accessed 29 March 2018].

  • Website

    Wade, M. and Shan, J.

    Strategies for Responding to Digital Disruption

    2016

    In-text: (Wade and Shan, 2016)

    Your Bibliography: Wade, M. and Shan, J., 2016. Strategies for Responding to Digital Disruption. [online] IMD business school. Available at: <https://www.imd.org/research/insightsimd/strategies-for-responding-to-digital-disruption2/> [Accessed 29 March 2018].

  • Website

    Wessel, M. and Christensen, C. M.

    Surviving Disruption

    2012

    In-text: (Wessel and Christensen, 2012)

    Your Bibliography: Wessel, M. and Christensen, C., 2012. Surviving Disruption. [online] Harvard Business Review. Available at: <https://hbr.org/2012/12/surviving-disruption> [Accessed 29 March 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join