These are the sources and citations used to research IFB102 workbook2.3. This bibliography was generated on Cite This For Me on
In-text: (Bloomberg, 2014)
Your Bibliography: Bloomberg, J., 2014. Forbes Welcome. [online] Forbes.com. Available at: <https://www.forbes.com/sites/jasonbloomberg/2014/10/16/cybersecurity-turning-the-tide-on-hackers-with-dispersive-technologies/#7fddd46448af> [Accessed 3 May 2018].
In-text: (Ciber, 2018)
Your Bibliography: Ciber, J., 2018. Hot Technologies Cyber Security - Cyber Security Portal. [online] Cyber Security Portal. Available at: <https://cybersecurityportal.com/resources/hot-technologies-cyber-security/> [Accessed 3 May 2018].
In-text: (Kemper, 2017)
Your Bibliography: Kemper, G., 2017. How Large Businesses Approach Cybersecurity in 2017: Survey | Clutch.co. [online] Clutch.co. Available at: <https://clutch.co/it-services/cybersecurity/resources/how-large-businesses-approach-cybersecurity-survey> [Accessed 4 May 2018].
In-text: (Meyer, 2017)
Your Bibliography: Meyer, C., 2017. Nearly All Large Businesses Have a Cybersecurity Policy, But Is It Strong Enough?. [online] Security magazine. Available at: <https://www.securitymagazine.com/articles/88341-nearly-all-large-businesses-have-a-cybersecurity-policy-but-is-it-strong-enough> [Accessed 3 May 2018].
10,587 students joined last month!