These are the sources and citations used to research BIBLIOGRAPHIE. This bibliography was generated on Cite This For Me on
In-text: (Beekmans, 2015)
Your Bibliography: Beekmans, G., 2015. Linux.com :: Ping: ICMP vs. ARP. [online] Archive09.linux.com. Available at: <http://archive09.linux.com/articles/50596> [Accessed 4 September 2014].
In-text: (Brandon, 2014)
Your Bibliography: Brandon, J., 2014. 6 security threats more deadly than Heartbleed or Shellshock. [online] TechRadar. Available at: <http://www.techradar.com/news/world-of-tech/6-security-threats-more-deadly-than-heartbleed-or-shellshock-1268481/1> [Accessed 16 October 2014].
In-text: (Buso, 2012)
Your Bibliography: Buso, B., 2012. 5 Computer Hacks from Movies You Won't Believe Are Possible. [online] Cracked.com. Available at: <http://www.cracked.com/article_19754_5-computer-hacks-from-movies-you-wont-believe-are-possible.html> [Accessed 31 April 2014].
In-text: (Cerrudo, 2014)
Your Bibliography: Cerrudo, C., 2014. IOActive Labs Research: Hacking US (and UK, Australia, France, etc.) Traffic Control Systems. [online] Blog.ioactive.com. Available at: <http://blog.ioactive.com/2014/04/hacking-us-and-uk-australia-france-etc.html> [Accessed 22 April 2014].
In-text: (Choy, 2015)
Your Bibliography: Choy, D., 2015. Emma Watson Nude: Threat Hoax Intended To Take Down 4Chan? [REPORT,VIDEO]. [online] Latin Times. Available at: <http://www.latintimes.com/emma-watson-nude-threat-hoax-intended-take-down-4chan-reportvideo-263915> [Accessed 1 October 2014].
In-text: (Features, 2015)
Your Bibliography: dSploit. 2015. Features. [online] Available at: <http://dsploit.net/features/> [Accessed 18 April 2014].
In-text: (Ghena et al., 2014)
Your Bibliography: Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J. and Halderman, J., 2014. Green Lights Forever: Analyzing the Security of Traffic Infrastructure. In: Proceedings of the 8th USENIX Workshop on Offensive Technologies. [online] pp.1-8. Available at: <https://jhalderm.com/pub/papers/traffic-woot14.pdf> [Accessed 2 November 2014].
In-text: (Gurman, 2014)
Your Bibliography: Gurman, M., 2014. Apple denies iCloud/Find my iPhone breach, says 'very targeted attack' hit certain celebrities. [online] 9to5Mac. Available at: <http://9to5mac.com/2014/09/02/apple-confirms-very-targeted-attack-on-celebrities-denies-icloud-breach/> [Accessed 10 September 2014].
In-text: (Gurman, 2014)
Your Bibliography: Gurman, M., 2014. Tim Cook addresses iCloud photos hacking, says major security improvements coming soon. [online] 9to5Mac. Available at: <http://9to5mac.com/2014/09/04/tim-cook-addresses-icloud-photos-hacking-says-major-security-improvements-coming-soon/> [Accessed 10 September 2014].
In-text: (Hunt, 2014)
Your Bibliography: Hunt, T., 2014. Troy Hunt: Everything you need to know about the Heartbleed SSL bug. [online] Troy Hunt. Available at: <http://www.troyhunt.com/2014/04/everything-you-need-to-know-about.html> [Accessed 25 September 2014].
In-text: (Jacobs, 2014)
Your Bibliography: Jacobs, S., 2014. Traffic Light Study Reveals Serious Hacking Risk | MIT Technology Review. [online] MIT Technology Review. Available at: <http://www.technologyreview.com/news/530216/researchers-hack-into-michigans-traffic-lights/> [Accessed 13 October 2014].
In-text: (Cyberoam Knowledge Base, 2015)
Your Bibliography: Kb.cyberoam.com. 2015. Cyberoam Knowledge Base. [online] Available at: <http://kb.cyberoam.com/default.asp?id=2909&Lang=1> [Accessed 25 September 2014].
In-text: (Lewis, 2014)
Your Bibliography: Lewis, D., 2014. Biometric Security And Bowie Knives. [online] Forbes. Available at: <http://www.forbes.com/sites/davelewis/2014/09/23/biometric-security-and-bowie-knives/> [Accessed 10 October 2014].
In-text: (Lewis, 2014)
Your Bibliography: Lewis, D., 2014. iCloud Data Breach: Hacking And Celebrity Photos. [online] Forbes. Available at: <http://www.forbes.com/sites/davelewis/2014/09/02/icloud-data-breach-hacking-and-nude-celebrity-photos/> [Accessed 2 September 2014].
In-text: (Margaritelli, 2014)
Your Bibliography: Margaritelli, S., 2014. dSploit.
In-text: (McMillan, 2014)
Your Bibliography: McMillan, R., 2014. The Internet Is Broken, and Shellshock Is Just the Start of Our Woes | WIRED. [online] WIRED. Available at: <http://www.wired.com/2014/09/shellshocked-bash/?utm_source=zergnet.com&utm_medium=referral&utm_campaign=zergnet_277923&mbid=synd_zergnet> [Accessed 18 October 2014].
In-text: (Möller, Duong and Kotowicz, 2014)
Your Bibliography: Möller, B., Duong, T. and Kotowicz, K., 2014. This POODLE Bites: Exploiting The SSL 3.0 Fallback. 1st ed. [ebook] Google, p.4. Available at: <https://www.openssl.org/~bodo/ssl-poodle.pdf> [Accessed 24 October 2014].
In-text: (Puente, 2015)
Your Bibliography: Puente, M., 2015. Celeb nude photo-hack victims threaten to sue Google. [online] Usatoday.com. Available at: <http://www.usatoday.com/story/life/people/2014/10/02/celeb-nude-photo-hack-victims-threaten-to-sue-google/16588007/> [Accessed 10 October 2014].
In-text: (Shankdhar, 2013)
Your Bibliography: Shankdhar, P., 2013. Security and Hacking apps for Android devices - InfoSec Institute. [online] InfoSec Institute. Available at: <http://resources.infosecinstitute.com/security-hacking-apps-android/> [Accessed 10 May 2014].
In-text: (The Fappening, 2015)
Your Bibliography: Thepiratebay.cr. 2015. The Fappening. [online] Available at: <http://thepiratebay.cr/search.php?q=the+fappening&page=0&orderby=99> [Accessed 20 November 2014].
In-text: (JavaScript Injection (Tutorials) - ThisisLegal.com, 2015)
Your Bibliography: Thisislegal.com. 2015. JavaScript Injection (Tutorials) - ThisisLegal.com. [online] Available at: <http://www.thisislegal.com/tutorials/7> [Accessed 1 January 2015].
In-text: (Heartbleed, 2015)
Your Bibliography: Wikipedia. 2015. Heartbleed. [online] Available at: <http://en.wikipedia.org/wiki/Heartbleed> [Accessed 25 September 2014].
In-text: (McGurk effect, 2015)
Your Bibliography: Wikipedia. 2015. McGurk effect. [online] Available at: <http://en.wikipedia.org/wiki/McGurk_effect> [Accessed 9 January 2015].
In-text: (Winkapp, 2015)
Your Bibliography: Winkapp. 2015. Winkapp. [online] Available at: <http://www.winkapp.co/> [Accessed 28 September 2014].
In-text: (zANTI - Mobile Security Risk Assessment | Zimperium, 2015)
Your Bibliography: Zimperium.com. 2015. zANTI - Mobile Security Risk Assessment | Zimperium. [online] Available at: <https://www.zimperium.com/zanti-mobile-penetration-testing> [Accessed 28 December 2014].
10,587 students joined last month!