These are the sources and citations used to research CRM Reference. This bibliography was generated on Cite This For Me on

  • Website

    BBC

    BBC - GCSE Bitesize: Implementation

    2018

    In-text: (BBC, 2018)

    Your Bibliography: BBC, 2018. BBC - GCSE Bitesize: Implementation. [online] Bbc.co.uk. Available at: <http://www.bbc.co.uk/schools/gcsebitesize/ict/system/1implementingrev3.shtml> [Accessed 17 March 2018].

  • Journal

    Brisson‐Banks, C. V.

    Managing change and transitions: a comparison of different models and their commonalities

    2010 - Library Management

    In-text: (Brisson‐Banks, 2010)

    Your Bibliography: Brisson‐Banks, C., 2010. Managing change and transitions: a comparison of different models and their commonalities. Library Management, [online] 31(4/5), pp.241-252. Available at: <http://hawbw202.pbworks.com/f/Managing_change.pdf> [Accessed 17 March 2018].

  • E-book or PDF

    Copeland, M.

    Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center

    2017 - Apress - New York

    In-text: (Copeland, 2017)

    Your Bibliography: Copeland, M., 2017. Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center. 1st ed. [ebook] New York: Apress, pp.192-193. Available at: <https://books.google.co.uk/books?id=gYotDwAAQBAJ&pg=PA192&dq=Azure+DDOS+Protection&hl=en&sa=X&ved=0ahUKEwi-jPeZ99_aAhVEP5oKHW7aB30Q6AEIMzAC#v=onepage&q=Azure%20DDOS%20Protection&f=true> [Accessed 30 April 2018].

  • Website

    Creasey, T.

    3 Types of Change-Resistant Employees and How to Engage them

    2018

    In-text: (Creasey, 2018)

    Your Bibliography: Creasey, T., 2018. 3 Types of Change-Resistant Employees and How to Engage them. [online] Blog.prosci.com. Available at: <http://blog.prosci.com/3-types-of-change-resistant-employees-and-how-to-engage-them> [Accessed 1 May 2018].

  • Website

    Davis, K.

    Pros and Cons: Digging into Amazon Web Services | NPI

    2014

    In-text: (Davis, 2014)

    Your Bibliography: Davis, K., 2014. Pros and Cons: Digging into Amazon Web Services | NPI. [online] NPI. Available at: <https://npifinancial.com/blog/pros-and-cons-digging-into-amazon-web-services/> [Accessed 4 May 2018].

  • E-book or PDF

    Dornbusch, P., Moller, M. and Buttermann, A.

    It- Security in Global Corporate Networks

    2003 - Muchen - Germany

    In-text: (Dornbusch, Moller and Buttermann, 2003)

    Your Bibliography: Dornbusch, P., Moller, M. and Buttermann, A., 2003. It- Security in Global Corporate Networks. 1st ed. [ebook] Germany: Muchen, p.195. Available at: <https://books.google.co.uk/books?id=tGq-wQMarfMC&dq=how+do+network+admins+prevent+unlicensed+software&source=gbs_navlinks_s> [Accessed 29 March 2018].

  • Website

    Ease Us

    Differential Backup VS Incremental Backup - EaseUS Todo Backup

    2018

    In-text: (Ease Us, 2018)

    Your Bibliography: Ease Us, 2018. Differential Backup VS Incremental Backup - EaseUS Todo Backup. [online] Easeus.com. Available at: <https://www.easeus.com/backup-utility/differential-backup-vs-incremental-backup.html> [Accessed 29 March 2018].

  • Online image or video

    Fatayri, R.

    Change Model-Beckhard

    2016

    In-text: (Fatayri, 2016)

    Your Bibliography: Fatayri, R., 2016. Change Model-Beckhard. [video] Available at: <https://www.youtube.com/watch?v=GSllNcVF8zo> [Accessed 30 April 2018].

  • Website

    Fazackerley, A.

    What would happen if a UK university went bust?

    2017

    In-text: (Fazackerley, 2017)

    Your Bibliography: Fazackerley, A., 2017. What would happen if a UK university went bust?. [online] the Guardian. Available at: <https://www.theguardian.com/education/2017/feb/07/what-if-uk-university-goes-bust-ucas-students> [Accessed 25 March 2018].

  • E-book or PDF

    Ferguson, B.

    Network + Fast Pass

    2018 - John Wiley & Sons - New Jersey

    In-text: (Ferguson, 2018)

    Your Bibliography: Ferguson, B., 2018. Network + Fast Pass. 1st ed. [ebook] New Jersey: John Wiley & Sons, p.146. Available at: <https://books.google.co.uk/books?id=IlaQUhe0dusC&pg=PA146&dq=incremental+full+differential+backup+comparison&hl=en&sa=X&ved=0ahUKEwi9jvy0y5LaAhUMYlAKHaMtB2EQ6AEIJzAA#v=onepage&q=incremental%20full%20differential%20backup%20comparison&f=false> [Accessed 4 May 2018].

  • Website

    Google Cloud

    What makes Google Cloud Platform different?  |  Google Cloud Platform Free Tier  |  Google Cloud

    2018

    In-text: (Google Cloud, 2018)

    Your Bibliography: Google Cloud, 2018. What makes Google Cloud Platform different?  |  Google Cloud Platform Free Tier  |  Google Cloud. [online] Google Cloud. Available at: <https://cloud.google.com/free/docs/what-makes-google-cloud-platform-different#google-grade_security> [Accessed 4 May 2018].

  • E-book or PDF

    Howarth, A., Stanton, B. and Sinclair-Hunt, M.

    Information Systems Management

    2001 - Select Knowledge - Beaconsfield

    In-text: (Howarth, Stanton and Sinclair-Hunt, 2001)

    Your Bibliography: Howarth, A., Stanton, B. and Sinclair-Hunt, M., 2001. Information Systems Management. 1st ed. [ebook] Beaconsfield: Select Knowledge, p.129. Available at: <https://books.google.co.uk/books?id=eoJqOXvUj5UC&pg=PA129&dq=phased+changeover&hl=en&sa=X&ved=0ahUKEwjg4ZP0wuXaAhUqBMAKHcm8DQAQ6AEIJzAA#v=onepage&q=phased%20changeover&f=false> [Accessed 1 May 2018].

  • Website

    Incapsula

    2018

    In-text: (Incapsula, 2018)

    Your Bibliography: Incapsula, 2018. [online] Incapsula.com. Available at: <https://www.incapsula.com/ddos-protection-for-microsoft-azure.html> [Accessed 30 April 2018].

  • Website

    Innovation for social change

    Do you know your stakeholders? Tool to undertake a Stakeholder analysis - Innovation for Social Change

    2014

    In-text: (Innovation for social change, 2014)

    Your Bibliography: Innovation for social change, 2014. Do you know your stakeholders? Tool to undertake a Stakeholder analysis - Innovation for Social Change. [online] Innovation for Social Change. Available at: <http://innovationforsocialchange.org/stakeholder-analysis/?lang=en> [Accessed 17 March 2018].

  • Website

    Khan, T. R.

    What is Azure DDoS Protection Service?

    2017

    In-text: (Khan, 2017)

    Your Bibliography: Khan, T., 2017. What is Azure DDoS Protection Service?. [online] Cloudmonix. Available at: <http://www.cloudmonix.com/blog/what-is-azure-ddos-protection-service/> [Accessed 1 May 2018].

  • Website

    Kohout, J.

    TeskaLabs Blog · How DDoS Attacks Can Sink Your Business

    2018

    In-text: (Kohout, 2018)

    Your Bibliography: Kohout, J., 2018. TeskaLabs Blog · How DDoS Attacks Can Sink Your Business. [online] TeskaLabs Blog. Available at: <https://www.teskalabs.com/blog/how-ddos-can-sink-your-business> [Accessed 30 April 2018].

  • Report

    Koyun, A. and Janabi, E. A.

    Social Engineering Attacks

    2017 - Suleyman Demirel University - Department of Computer Engineering

    In-text: (Koyun and Janabi, 2017)

    Your Bibliography: Koyun, A. and Janabi, E., 2017. Social Engineering Attacks. Journal of Multidisciplinary Engineering Science and Technology (JMEST. [online] Department of Computer Engineering: Suleyman Demirel University, pp.3-6. Available at: <http://www.jmest.org/wp-content/uploads/JMESTN42352270.pdf> [Accessed 4 April 2018].

  • Website

    Lifewire

    What Is the Windows Registry & What's It Used For?

    2018

    In-text: (Lifewire, 2018)

    Your Bibliography: Lifewire, 2018. What Is the Windows Registry & What's It Used For?. [online] Lifewire. Available at: <https://www.lifewire.com/windows-registry-2625992> [Accessed 29 March 2018].

  • Website

    Lifewire

    What Is the Windows Registry & What's It Used For?

    2018

    In-text: (Lifewire, 2018)

    Your Bibliography: Lifewire, 2018. What Is the Windows Registry & What's It Used For?. [online] Lifewire. Available at: <https://www.lifewire.com/windows-registry-2625992> [Accessed 29 March 2018].

  • Website

    Limestone Networks

    How long will it take to reload / set up my new server?

    2018

    In-text: (Limestone Networks, 2018)

    Your Bibliography: Limestone Networks, 2018. How long will it take to reload / set up my new server?. [online] Limestonenetworks.com. Available at: <https://www.limestonenetworks.com/support/knowledge-center/13/34/how_long_will_it_take_to_reload___set_up_my_new_server.html> [Accessed 1 May 2018].

  • Online image or video

    MCI

    Change Management - 30-Second Management Training Course

    2008

    In-text: (MCI, 2008)

    Your Bibliography: MCI, 2008. Change Management - 30-Second Management Training Course. [video] Available at: <https://www.youtube.com/watch?v=fpuHUiy_xog> [Accessed 1 May 2018].

  • Website

    Microsoft Azure

    Azure DDoS Protection Standard Overview

    2018

    In-text: (Microsoft Azure, 2018)

    Your Bibliography: Microsoft Azure, 2018. Azure DDoS Protection Standard Overview. [online] Docs.microsoft.com. Available at: <https://docs.microsoft.com/en-us/azure/virtual-network/ddos-protection-overview> [Accessed 1 May 2018].

  • Website

    Microsoft Azure

    Azure Storage – Secure cloud storage | Microsoft Azure

    2018

    In-text: (Microsoft Azure, 2018)

    Your Bibliography: Microsoft Azure, 2018. Azure Storage – Secure cloud storage | Microsoft Azure. [online] Azure.microsoft.com. Available at: <https://azure.microsoft.com/en-gb/services/storage/> [Accessed 4 May 2018].

  • Website

    Microsoft Azure

    Azure Storage Pricing | Microsoft Azure

    2018

    In-text: (Microsoft Azure, 2018)

    Your Bibliography: Microsoft Azure, 2018. Azure Storage Pricing | Microsoft Azure. [online] Azure.microsoft.com. Available at: <https://azure.microsoft.com/en-gb/pricing/details/storage/> [Accessed 4 May 2018].

  • Website

    Microsoft Azure

    Pricing – Azure DDoS Protection and Mitigation Services | Microsoft Azure

    2018

    In-text: (Microsoft Azure, 2018)

    Your Bibliography: Microsoft Azure, 2018. Pricing – Azure DDoS Protection and Mitigation Services | Microsoft Azure. [online] Azure.microsoft.com. Available at: <https://azure.microsoft.com/en-gb/pricing/details/ddos-protection/> [Accessed 1 May 2018].

  • Website

    Microsoft Azure

    Pricing – Azure DDoS Protection and Mitigation Services | Microsoft Azure

    2018

    In-text: (Microsoft Azure, 2018)

    Your Bibliography: Microsoft Azure, 2018. Pricing – Azure DDoS Protection and Mitigation Services | Microsoft Azure. [online] Azure.microsoft.com. Available at: <https://azure.microsoft.com/en-gb/pricing/details/ddos-protection/> [Accessed 4 May 2018].

  • Website

    Mulholland, B.

    8 Critical Change Management Models to Evolve and Survive | Process Street

    2017

    In-text: (Mulholland, 2017)

    Your Bibliography: Mulholland, B., 2017. 8 Critical Change Management Models to Evolve and Survive | Process Street. [online] Process Street. Available at: <https://www.process.st/change-management-models/> [Accessed 17 March 2018].

  • E-book or PDF

    Nepal, S. and Patha,, M.

    Security, Privacy and Trust in Cloud Systems

    2013 - Springer Science & Business Media - Berlin

    In-text: (Nepal and Patha, 2013)

    Your Bibliography: Nepal, S. and Patha,, M., 2013. Security, Privacy and Trust in Cloud Systems. 1st ed. [ebook] Berlin: Springer Science & Business Media, p.213. Available at: <https://books.google.co.uk/books?id=fTPABAAAQBAJ&printsec=frontcover&dq=how+cloud+storage+work+increases+security&hl=en&sa=X&ved=0ahUKEwjSnKLM_t_aAhUC3iwKHc6kDtgQ6AEIUjAH#v=onepage&q&f=false> [Accessed 4 May 2018].

  • E-book or PDF

    Queensland Government Chief Information Office

    Change Management Plan Workbook and Template

    2018 - Information Office - Queenland

    In-text: (Queensland Government Chief Information Office, 2018)

    Your Bibliography: Queensland Government Chief Information Office, 2018. Change Management Plan Workbook and Template. 1st ed. [ebook] Queenland: Information Office, p.9. Available at: <http://www.nrm.wa.gov.au/media/10528/change_management_plan_workbook_and_template.pdf> [Accessed 17 March 2018].

  • E-book or PDF

    Rosenblatt, H. J.

    Systems Analysis and Design

    2013 - Cengage Learning - Boston

    In-text: (Rosenblatt, 2013)

    Your Bibliography: Rosenblatt, H., 2013. Systems Analysis and Design. 1st ed. [ebook] Boston: Cengage Learning, p.486. Available at: <https://books.google.co.uk/books?id=tdUWAAAAQBAJ&pg=PA486&dq=advantages+and+disadvantages+of+changeover+methods&hl=en&sa=X&ved=0ahUKEwjirpaCvfTZAhVFOJoKHd1oAZ8Q6AEIJzAA#v=onepage&q=advantages%20and%20disadvantages%20of%20changeover%20methods&f=true> [Accessed 17 March 2018].

  • Website

    Rouse, M.

    Full, incremental or differential: How to choose the correct backup type

    2018

    In-text: (Rouse, 2018)

    Your Bibliography: Rouse, M., 2018. Full, incremental or differential: How to choose the correct backup type. [online] SearchDataBackup. Available at: <http://searchdatabackup.techtarget.com/feature/Full-incremental-or-differential-How-to-choose-the-correct-backup-type> [Accessed 29 March 2018].

  • Website

    Saxe, M.

    The Importance Of Training Staff When Upgrading IT Systems

    2014

    In-text: (Saxe, 2014)

    Your Bibliography: Saxe, M., 2014. The Importance Of Training Staff When Upgrading IT Systems. [online] Saxons Blog. Available at: <http://www.saxonsgroup.com.au/blog/tech/the-importance-of-training-staff-when-upgrading-it-systems/> [Accessed 30 April 2018].

  • Website

    SSL Shopper

    What is Code Signing?

    2018

    In-text: (SSL Shopper, 2018)

    Your Bibliography: SSL Shopper, 2018. What is Code Signing?. [online] Sslshopper.com. Available at: <https://www.sslshopper.com/what-is-code-signing.html> [Accessed 29 March 2018].

  • E-book or PDF

    Waddell, D. and Sohal, A. S.

    Resistance: a constructive tool for change management

    1998 - Monash University - Melbourne

    In-text: (Waddell and Sohal, 1998)

    Your Bibliography: Waddell, D. and Sohal, A., 1998. Resistance: a constructive tool for change management. 1st ed. [ebook] Melbourne: Monash University, p.544. Available at: <https://pdfs.semanticscholar.org/4078/f6eefff73e2351e7e64280802d38f06132ad.pdf> [Accessed 18 March 2018].

  • Website

    Wagastaff, K. and Sottile, C. A.

    Cyberattack 101: Why Hackers Are Going After Universities

    2015

    In-text: (Wagastaff and Sottile, 2015)

    Your Bibliography: Wagastaff, K. and Sottile, C., 2015. Cyberattack 101: Why Hackers Are Going After Universities. [online] NBC News. Available at: <https://www.nbcnews.com/tech/security/universities-become-targets-hackers-n429821> [Accessed 30 April 2018].

  • Website

    Warrell, M.

    Forbes Welcome

    2017

    In-text: (Warrell, 2017)

    Your Bibliography: Warrell, M., 2017. Forbes Welcome. [online] Forbes.com. Available at: <https://www.forbes.com/sites/margiewarrell/2017/04/15/ten-things-great-leaders-do-to-get-people-on-board-with-change/#12c9537828cd> [Accessed 18 March 2018].

  • Online image or video

    Wedell, G.

    What is change management? Training vidoe

    2018

    In-text: (Wedell, 2018)

    Your Bibliography: Wedell, G., 2018. What is change management? Training vidoe. [video] Available at: <https://www.youtube.com/watch?v=__IlYNMdV9E> [Accessed 3 May 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join