These are the sources and citations used to research ISSC660. This bibliography was generated on Cite This For Me on
In-text: (B, 2016)
Your Bibliography: B, M., 2016. DATA SECURITY AND SECURITY CONTROLS IN CLOUD COMPUTING. International Journal of Advances in Electronics and Computer Science, [online] Sept. - 2016(Special Issue). Available at: <http://www.iraj.in/journal/journal_file/journal_pdf/12-295-147547115711-13.pdf> [Accessed 13 May 2018].
In-text: (Jacobs, 2016)
Your Bibliography: Jacobs, S., 2016. Engineering Information Security. 2nd ed. Hoboken: John Wiley & Sons, Inc.
In-text: (Krausz., 2009)
Your Bibliography: Krausz., M., 2009. Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition. 2nd ed. Cambridgeshire: IT Governance Ltd.
In-text: (Patterson, 2018)
Your Bibliography: Patterson, D., 2018. Cybersecurity's biggest challenges: Trust, cyber fatigue, and the battle over AI. [online] TechRepublic. Available at: <https://www.techrepublic.com/article/cybersecuritys-biggest-challenge-trust/> [Accessed 23 May 2018].
In-text: (Plachkinova and Maurer, 2018)
Your Bibliography: Plachkinova, M. and Maurer, C., 2018. Teaching Case Security Breach at Target. Journal of Information Systems Education, 29(1)(Winter 2018).
10,587 students joined last month!