These are the sources and citations used to research Weekly Workbook Part C. This bibliography was generated on Cite This For Me on

  • Website

    Hardware Authentication

    2018

    In-text: (Hardware Authentication, 2018)

    Your Bibliography: Authstrong.com. 2018. Hardware Authentication. [online] Available at: <http://www.authstrong.com/Solutions-Hardware-Authentication.asp> [Accessed 27 April 2018].

  • Website

    Caron, K.

    What Is Hardware Authentication?

    2018

    In-text: (Caron, 2018)

    Your Bibliography: Caron, K., 2018. What Is Hardware Authentication?. [online] It Still Works. Available at: <https://itstillworks.com/hardware-authentication-7729109.html> [Accessed 28 April 2018].

  • Website

    Encryption key management is vital to securing enterprise data storage

    2010

    In-text: (Encryption key management is vital to securing enterprise data storage, 2010)

    Your Bibliography: ComputerWeekly.com. 2010. Encryption key management is vital to securing enterprise data storage. [online] Available at: <https://www.computerweekly.com/feature/Encryption-key-management-is-vital-to-securing-enterprise-data-storage> [Accessed 29 April 2018].

  • Website

    CybeRisk

    Hardware Authentication and it's Place in Cybersecurity

    2016

    In-text: (CybeRisk, 2016)

    Your Bibliography: CybeRisk, 2016. Hardware Authentication and it's Place in Cybersecurity. [online] CybeRisk. Available at: <https://www.cyberisk.biz/hardware-authentication/> [Accessed 27 April 2018].

  • Website

    Hachman, M.

    Intel's Authenticate tech brings simple-but-powerful security to Skylake chips

    2016

    In-text: (Hachman, 2016)

    Your Bibliography: Hachman, M., 2016. Intel's Authenticate tech brings simple-but-powerful security to Skylake chips. [online] PCWorld. Available at: <https://www.pcworld.com/article/3024314/security/intels-authenticate-tech-brings-simple-but-powerful-security-to-skylake-chips.html> [Accessed 27 April 2018].

  • Website

    Jollans, A.

    3 critical security issues for the modern enterprise - IBM IT Infrastructure Blog

    2017

    In-text: (Jollans, 2017)

    Your Bibliography: Jollans, A., 2017. 3 critical security issues for the modern enterprise - IBM IT Infrastructure Blog. [online] IBM IT Infrastructure Blog. Available at: <https://www.ibm.com/blogs/systems/3-critical-security-issues-for-the-modern-enterprise/> [Accessed 26 April 2018].

  • Website

    Lennon, M.

    New Intel Chips Pack Hardware Authentication Technology | SecurityWeek.Com

    2016

    In-text: (Lennon, 2016)

    Your Bibliography: Lennon, M., 2016. New Intel Chips Pack Hardware Authentication Technology | SecurityWeek.Com. [online] Securityweek.com. Available at: <https://www.securityweek.com/new-intel-chips-pack-hardware-authentication-technology> [Accessed 29 April 2018].

  • Website

    Mello Jr., J. P.

    Top 5 emerging information security technologies

    2017

    In-text: (Mello Jr., 2017)

    Your Bibliography: Mello Jr., J., 2017. Top 5 emerging information security technologies. [online] TechBeacon. Available at: <https://techbeacon.com/5-emerging-security-technologies-set-level-battlefield> [Accessed 28 April 2018].

  • Website

    Nash, R.

    Key management challenges and best practices

    In-text: (Nash, n.d.)

    Your Bibliography: Nash, R., n.d. Key management challenges and best practices. [online] SearchFinancialSecurity. Available at: <https://searchfinancialsecurity.techtarget.com/tip/Key-management-challenges-and-best-practices> [Accessed 28 April 2018].

  • Website

    Parms, J.

    Security Issues in the Age of Big Data - business.com

    2017

    In-text: (Parms, 2017)

    Your Bibliography: Parms, J., 2017. Security Issues in the Age of Big Data - business.com. [online] business.com. Available at: <https://www.business.com/articles/privacy-and-security-issues-in-the-age-of-big-data/> [Accessed 29 April 2018].

  • Website

    Pierson, L.

    Big Data Security Issues in the Enterprise via @BMCSoftware

    2016

    In-text: (Pierson, 2016)

    Your Bibliography: Pierson, L., 2016. Big Data Security Issues in the Enterprise via @BMCSoftware. [online] Bmc.com. Available at: <http://www.bmc.com/blogs/big-data-security-issues-enterprise/> [Accessed 29 April 2018].

  • Website

    Roiter, N.

    Automating and securing file transfers: key issues

    2011

    In-text: (Roiter, 2011)

    Your Bibliography: Roiter, N., 2011. Automating and securing file transfers: key issues. [online] CSO Online. Available at: <https://www.csoonline.com/article/2129057/identity-management/automating-and-securing-file-transfers--key-issues.html> [Accessed 29 April 2018].

  • Website

    Rozario, R.

    2010

    In-text: (Rozario, 2010)

    Your Bibliography: Rozario, R., 2010. [online] Embedded-computing.com. Available at: <http://www.embedded-computing.com/embedded-computing-design/hardware-authentication-secures-design-ip-and-end-user-experience> [Accessed 29 April 2018].

  • Website

    Ryoo, J.

    The age of hacking brings a return to the physical key

    2017

    In-text: (Ryoo, 2017)

    Your Bibliography: Ryoo, J., 2017. The age of hacking brings a return to the physical key. [online] The Conversation. Available at: <https://theconversation.com/the-age-of-hacking-brings-a-return-to-the-physical-key-73094> [Accessed 29 April 2018].

  • Website

    Schuman, E.

    NIST: In mobile authentication, think hardware, not software

    2017

    In-text: (Schuman, 2017)

    Your Bibliography: Schuman, E., 2017. NIST: In mobile authentication, think hardware, not software. [online] Computerworld. Available at: <https://www.computerworld.com/article/3217749/retail-it/nist-in-mobile-authentication-think-hardware-not-software.html> [Accessed 29 April 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join