These are the sources and citations used to research Ethical Hacking Report. This bibliography was generated on Cite This For Me on

  • Journal

    Ashoor, A. S. and Gore, S.

    Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)

    2011 - Advances in Network Security and Applications

    In-text: (Ashoor and Gore, 2011)

    Your Bibliography: Ashoor, A. and Gore, S., 2011. Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). Advances in Network Security and Applications, pp.497-501.

  • Website

    Beckert, K.

    Network Security Threats: Types & Vulnerabilities | Study.com

    2018

    In-text: (Beckert, 2018)

    Your Bibliography: Beckert, K., 2018. Network Security Threats: Types & Vulnerabilities | Study.com. [online] Study.com. Available at: <https://study.com/academy/lesson/network-security-threats-types-vulnerabilities.html> [Accessed 5 May 2018].

  • Patent

    Caivano, A. and Baronissi, P.

    LAWFUL INTERCEPTION OF NATAPAT

    2018 - United States

    In-text: (Caivano and Baronissi, 2018)

    Your Bibliography: Caivano, A. and Baronissi, P., 2018. LAWFUL INTERCEPTION OF NATAPAT. US 2011/0191467 A1.

  • Website

    TACACS+ and RADIUS Comparison

    2018

    In-text: (TACACS+ and RADIUS Comparison, 2018)

    Your Bibliography: Cisco. 2018. TACACS+ and RADIUS Comparison. [online] Available at: <https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html> [Accessed 13 May 2018].

  • Website

    Gamundani, A. M., Nambili, J. N. and Bere, M.

    A VPN Security Solution for Connectivity over Insecure Network Channels: A novel study.

    2018 - SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE) – volume1 issue7 September 2014

    In-text: (Gamundani, Nambili and Bere, 2018)

    Your Bibliography: Gamundani, A., Nambili, J. and Bere, M., 2018. A VPN Security Solution for Connectivity over Insecure Network Channels: A novel study.. [online] https://www.researchgate.net. Available at: <https://www.researchgate.net/profile/Attlee_Gamundani/publication/271405994_A_VPN_Security_Solution_for_Connectivity_over_Insecure_Network_Channels_A_novel_study/links/54c744630cf238bb7d0a584a/A-VPN-Security-Solution-for-Connectivity-over-Insecure-Network-Channels-A-novel-study.pdf> [Accessed 12 May 2018].

  • Journal

    Nam, S., Kim, D. and Kim, J.

    Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks

    2010 - IEEE Communications Letters

    In-text: (Nam, Kim and Kim, 2010)

    Your Bibliography: Nam, S., Kim, D. and Kim, J., 2010. Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks. IEEE Communications Letters, 14(2), pp.187-189.

  • Journal

    Punithavathani, D. S. and Radley, S.

    Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo

    2014 - The Scientific World Journal

    In-text: (Punithavathani and Radley, 2014)

    Your Bibliography: Punithavathani, D. and Radley, S., 2014. Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo. The Scientific World Journal, [online] 2014, pp.1-8. Available at: <https://www.ncbi.nlm.nih.gov/pubmed/25506611> [Accessed 9 May 2018].

  • Website

    Rai, A. K., Tewari, R. R. and Upadhyay, S. K.

    Different Types of Attacks on Integrated MANET-Internet Communication

    2018

    In-text: (Rai, Tewari and Upadhyay, 2018)

    Your Bibliography: Rai, A., Tewari, R. and Upadhyay, S., 2018. Different Types of Attacks on Integrated MANET-Internet Communication. [online] Bing.com. Available at: <http://www.bing.com/cr?IG=234637D2048F4F8981E013E4B3494948&CID=127BB97DDBE366B0019CB293DA4C678B&rd=1&h=5S6phEg-niLW--tISSoCU_2oOs9q4eSL5eo8xl731Tk&v=1&r=http%3a%2f%2fciteseerx.ist.psu.edu%2fviewdoc%2fdownload%3fdoi%3d10.1.1.228.411%26rep%3drep1%26type%3dpdf&p=DevEx.LB.1,5508.1> [Accessed 12 May 2018].

  • E-book or PDF

    Tank, K. and Kiran, P.

    Ethical Hacking

    2014 - K. J. Institute of Engineering and Technology , Savli - Savli

    In-text: (Tank and Kiran, 2014)

    Your Bibliography: Tank, K. and Kiran, P., 2014. Ethical Hacking. [ebook] Savli: K. J. Institute of Engineering and Technology , Savli, p.1. Available at: <https://www.slideshare.net/samprada123/final-report-ethical-hacking-41748965> [Accessed 6 May 2018].

  • Website

    What is a Threat in Computing? - Definition from Techopedia

    2018

    In-text: (What is a Threat in Computing? - Definition from Techopedia, 2018)

    Your Bibliography: Techopedia.com. 2018. What is a Threat in Computing? - Definition from Techopedia. [online] Available at: <https://www.techopedia.com/definition/25263/threat> [Accessed 5 May 2018].

  • Website

    RFC 2784 - Generic Routing Encapsulation (GRE)

    2018

    In-text: (RFC 2784 - Generic Routing Encapsulation (GRE), 2018)

    Your Bibliography: Tools.ietf.org. 2018. RFC 2784 - Generic Routing Encapsulation (GRE). [online] Available at: <https://tools.ietf.org/html/rfc2784.html> [Accessed 9 May 2018].

  • Website

    Wilkins, S.

    Switchport Security Configuration

    2012

    In-text: (Wilkins, 2012)

    Your Bibliography: Wilkins, S., 2012. Switchport Security Configuration. [online] Pluralsight.com. Available at: <https://www.pluralsight.com/blog/it-ops/switchport-security-configuration> [Accessed 9 May 2018].

  • Journal

    ZHANGISSINA, G., KULDEEV, E. and SHAIKHANOVA, A.

    Data protection from network attacks

    2013 - Ukrainian Scientific Journal of Information Security

    In-text: (ZHANGISSINA, KULDEEV and SHAIKHANOVA, 2013)

    Your Bibliography: ZHANGISSINA, G., KULDEEV, E. and SHAIKHANOVA, A., 2013. Data protection from network attacks. Ukrainian Scientific Journal of Information Security, [online] 19(1). Available at: <https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8350625> [Accessed 11 May 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join