These are the sources and citations used to research cyber sec. This bibliography was generated on Cite This For Me on
In-text: (Bawden, 2016)
Your Bibliography: Bawden, T., 2016. Global warming: Data centres to consume three times as much energy in next decade, experts warn. [online] The Independent. Available at: <https://www.independent.co.uk/environment/global-warming-data-centres-to-consume-three-times-as-much-energy-in-next-decade-experts-warn-a6830086.html> [Accessed 8 May 2018].
In-text: (Bronsdon, n.d.)
Your Bibliography: Bronsdon, P., n.d. Pandie Bronsdon - Cyber Security Programme Manager at John Lewis Plc. [online] LinkedIn. Available at: <https://www.linkedin.com/in/pandie-bronsdon-52a57b3/> [Accessed 6 May 2018].
In-text: (How John Lewis conquered the web, n.d.)
Your Bibliography: n.d. How John Lewis conquered the web. [ebook] Computer Weekly. Available at: <http://www.inficron.com/content/john-lewis-case-study.pdf> [Accessed 6 May 2018].
In-text: (Logicalis Case Study: John Lewis Partnership, n.d.)
Your Bibliography: n.d. Logicalis Case Study: John Lewis Partnership. [ebook] Logicalis. Available at: <https://www.uk.logicalis.com/globalassets/united-kingdom/case-studies/john-lewis-partnership-case-study.pdf> [Accessed 6 May 2018].
In-text: (Democratising data analytics through automation, 2018)
Your Bibliography: Retail Week. 2018. Democratising data analytics through automation. [online] Available at: <https://www.retail-week.com/retail-voice/democratising-data-analytics-through-automation/7028464.article?authent=1> [Accessed 6 May 2018].
In-text: (Red Team Testing & Security Exercises, n.d.)
Your Bibliography: Secureworks. n.d. Red Team Testing & Security Exercises. [online] Available at: <https://www.secureworks.co.uk/capabilities/security-risk-consulting/red-team-testing> [Accessed 6 May 2018].
In-text: (Shah, 2016)
Your Bibliography: Shah, S., 2016. John Lewis CIO Paul Coby on dealing with Oracle and moving to DevOps | Computing. [online] Computing. Available at: <https://www.computing.co.uk/ctg/interview/2459518/john-lewis-cio-paul-coby-on-dealing-with-oracle-and-moving-to-devops> [Accessed 6 May 2018].
In-text: (Splunk at John Lewis, n.d.)
Your Bibliography: Splunk. n.d. Splunk at John Lewis. [online] Available at: <https://www.splunk.com/en_us/customers/success-stories/john-lewis.html> [Accessed 6 May 2018].
In-text: (Weiss, 2017)
Your Bibliography: Weiss, E., 2017. High Availability vs. Disaster Recovery. [online] CloudEndure. Available at: <https://www.cloudendure.com/blog/high-availability-vs-disaster-recovery/> [Accessed 6 May 2018].
In-text: (Williamson, 2017)
Your Bibliography: Williamson, C., 2017. Pseudonymization vs. Anonymization and How They Help With GDPR. [online] Protegrity. Available at: <https://www.protegrity.com/pseudonymization-vs-anonymization-help-gdpr/> [Accessed 6 May 2018].
In-text: (Zacharia, 2010)
Your Bibliography: Zacharia, M., 2010. Cyber security training for employees: Guidelines. [online] Computer Weekly. Available at: <https://www.computerweekly.com/tip/Cyber-security-training-for-employees-Guidelines> [Accessed 6 May 2018].
In-text: (Zurkus, 2017)
Your Bibliography: Zurkus, K., 2017. Zero Day Attacks, Vulnerabilities, Exploits Report. [online] Cybersecurity Ventures. Available at: <https://cybersecurityventures.com/zero-day-exploits-diary/> [Accessed 6 May 2018].
10,587 students joined last month!