These are the sources and citations used to research Ethical Hacking Report. This bibliography was generated on Cite This For Me on
In-text: (Ashoor and Gore, 2011)
Your Bibliography: Ashoor, A. and Gore, S., 2011. Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). Advances in Network Security and Applications, pp.497-501.
In-text: (Beckert, 2018)
Your Bibliography: Beckert, K., 2018. Network Security Threats: Types & Vulnerabilities | Study.com. [online] Study.com. Available at: <https://study.com/academy/lesson/network-security-threats-types-vulnerabilities.html> [Accessed 5 May 2018].
In-text: (Caivano and Baronissi, 2018)
Your Bibliography: Caivano, A. and Baronissi, P., 2018. LAWFUL INTERCEPTION OF NATAPAT. US 2011/0191467 A1.
In-text: (TACACS+ and RADIUS Comparison, 2018)
Your Bibliography: Cisco. 2018. TACACS+ and RADIUS Comparison. [online] Available at: <https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13838-10.html> [Accessed 13 May 2018].
In-text: (Gamundani, Nambili and Bere, 2018)
Your Bibliography: Gamundani, A., Nambili, J. and Bere, M., 2018. A VPN Security Solution for Connectivity over Insecure Network Channels: A novel study.. [online] https://www.researchgate.net. Available at: <https://www.researchgate.net/profile/Attlee_Gamundani/publication/271405994_A_VPN_Security_Solution_for_Connectivity_over_Insecure_Network_Channels_A_novel_study/links/54c744630cf238bb7d0a584a/A-VPN-Security-Solution-for-Connectivity-over-Insecure-Network-Channels-A-novel-study.pdf> [Accessed 12 May 2018].
In-text: (Nam, Kim and Kim, 2010)
Your Bibliography: Nam, S., Kim, D. and Kim, J., 2010. Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks. IEEE Communications Letters, 14(2), pp.187-189.
In-text: (Punithavathani and Radley, 2014)
Your Bibliography: Punithavathani, D. and Radley, S., 2014. Performance Analysis for Wireless Networks: An Analytical Approach by Multifarious Sym Teredo. The Scientific World Journal, [online] 2014, pp.1-8. Available at: <https://www.ncbi.nlm.nih.gov/pubmed/25506611> [Accessed 9 May 2018].
In-text: (Rai, Tewari and Upadhyay, 2018)
Your Bibliography: Rai, A., Tewari, R. and Upadhyay, S., 2018. Different Types of Attacks on Integrated MANET-Internet Communication. [online] Bing.com. Available at: <http://www.bing.com/cr?IG=234637D2048F4F8981E013E4B3494948&CID=127BB97DDBE366B0019CB293DA4C678B&rd=1&h=5S6phEg-niLW--tISSoCU_2oOs9q4eSL5eo8xl731Tk&v=1&r=http%3a%2f%2fciteseerx.ist.psu.edu%2fviewdoc%2fdownload%3fdoi%3d10.1.1.228.411%26rep%3drep1%26type%3dpdf&p=DevEx.LB.1,5508.1> [Accessed 12 May 2018].
In-text: (Tank and Kiran, 2014)
Your Bibliography: Tank, K. and Kiran, P., 2014. Ethical Hacking. [ebook] Savli: K. J. Institute of Engineering and Technology , Savli, p.1. Available at: <https://www.slideshare.net/samprada123/final-report-ethical-hacking-41748965> [Accessed 6 May 2018].
In-text: (What is a Threat in Computing? - Definition from Techopedia, 2018)
Your Bibliography: Techopedia.com. 2018. What is a Threat in Computing? - Definition from Techopedia. [online] Available at: <https://www.techopedia.com/definition/25263/threat> [Accessed 5 May 2018].
In-text: (RFC 2784 - Generic Routing Encapsulation (GRE), 2018)
Your Bibliography: Tools.ietf.org. 2018. RFC 2784 - Generic Routing Encapsulation (GRE). [online] Available at: <https://tools.ietf.org/html/rfc2784.html> [Accessed 9 May 2018].
In-text: (Wilkins, 2012)
Your Bibliography: Wilkins, S., 2012. Switchport Security Configuration. [online] Pluralsight.com. Available at: <https://www.pluralsight.com/blog/it-ops/switchport-security-configuration> [Accessed 9 May 2018].
In-text: (ZHANGISSINA, KULDEEV and SHAIKHANOVA, 2013)
Your Bibliography: ZHANGISSINA, G., KULDEEV, E. and SHAIKHANOVA, A., 2013. Data protection from network attacks. Ukrainian Scientific Journal of Information Security, [online] 19(1). Available at: <https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8350625> [Accessed 11 May 2018].
10,587 students joined last month!