These are the sources and citations used to research cyber sec. This bibliography was generated on Cite This For Me on

  • Website

    Bawden, T.

    Global warming: Data centres to consume three times as much energy in next decade, experts warn

    2016

    In-text: (Bawden, 2016)

    Your Bibliography: Bawden, T., 2016. Global warming: Data centres to consume three times as much energy in next decade, experts warn. [online] The Independent. Available at: <https://www.independent.co.uk/environment/global-warming-data-centres-to-consume-three-times-as-much-energy-in-next-decade-experts-warn-a6830086.html> [Accessed 8 May 2018].

  • Website

    Bronsdon, P.

    Pandie Bronsdon - Cyber Security Programme Manager at John Lewis Plc

    In-text: (Bronsdon, n.d.)

    Your Bibliography: Bronsdon, P., n.d. Pandie Bronsdon - Cyber Security Programme Manager at John Lewis Plc. [online] LinkedIn. Available at: <https://www.linkedin.com/in/pandie-bronsdon-52a57b3/> [Accessed 6 May 2018].

  • E-book or PDF

    How John Lewis conquered the web

    Computer Weekly

    In-text: (How John Lewis conquered the web, n.d.)

    Your Bibliography: n.d. How John Lewis conquered the web. [ebook] Computer Weekly. Available at: <http://www.inficron.com/content/john-lewis-case-study.pdf> [Accessed 6 May 2018].

  • E-book or PDF

    Logicalis Case Study: John Lewis Partnership

    Logicalis

    In-text: (Logicalis Case Study: John Lewis Partnership, n.d.)

    Your Bibliography: n.d. Logicalis Case Study: John Lewis Partnership. [ebook] Logicalis. Available at: <https://www.uk.logicalis.com/globalassets/united-kingdom/case-studies/john-lewis-partnership-case-study.pdf> [Accessed 6 May 2018].

  • Website

    Democratising data analytics through automation

    2018

    In-text: (Democratising data analytics through automation, 2018)

    Your Bibliography: Retail Week. 2018. Democratising data analytics through automation. [online] Available at: <https://www.retail-week.com/retail-voice/democratising-data-analytics-through-automation/7028464.article?authent=1> [Accessed 6 May 2018].

  • Website

    Red Team Testing & Security Exercises

    In-text: (Red Team Testing & Security Exercises, n.d.)

    Your Bibliography: Secureworks. n.d. Red Team Testing & Security Exercises. [online] Available at: <https://www.secureworks.co.uk/capabilities/security-risk-consulting/red-team-testing> [Accessed 6 May 2018].

  • Website

    Shah, S.

    John Lewis CIO Paul Coby on dealing with Oracle and moving to DevOps | Computing

    2016

    In-text: (Shah, 2016)

    Your Bibliography: Shah, S., 2016. John Lewis CIO Paul Coby on dealing with Oracle and moving to DevOps | Computing. [online] Computing. Available at: <https://www.computing.co.uk/ctg/interview/2459518/john-lewis-cio-paul-coby-on-dealing-with-oracle-and-moving-to-devops> [Accessed 6 May 2018].

  • Website

    Splunk at John Lewis

    In-text: (Splunk at John Lewis, n.d.)

    Your Bibliography: Splunk. n.d. Splunk at John Lewis. [online] Available at: <https://www.splunk.com/en_us/customers/success-stories/john-lewis.html> [Accessed 6 May 2018].

  • Website

    Weiss, E.

    High Availability vs. Disaster Recovery

    2017

    In-text: (Weiss, 2017)

    Your Bibliography: Weiss, E., 2017. High Availability vs. Disaster Recovery. [online] CloudEndure. Available at: <https://www.cloudendure.com/blog/high-availability-vs-disaster-recovery/> [Accessed 6 May 2018].

  • Website

    Williamson, C.

    Pseudonymization vs. Anonymization and How They Help With GDPR

    2017

    In-text: (Williamson, 2017)

    Your Bibliography: Williamson, C., 2017. Pseudonymization vs. Anonymization and How They Help With GDPR. [online] Protegrity. Available at: <https://www.protegrity.com/pseudonymization-vs-anonymization-help-gdpr/> [Accessed 6 May 2018].

  • Website

    Zacharia, M.

    Cyber security training for employees: Guidelines

    2010

    In-text: (Zacharia, 2010)

    Your Bibliography: Zacharia, M., 2010. Cyber security training for employees: Guidelines. [online] Computer Weekly. Available at: <https://www.computerweekly.com/tip/Cyber-security-training-for-employees-Guidelines> [Accessed 6 May 2018].

  • Website

    Zurkus, K.

    Zero Day Attacks, Vulnerabilities, Exploits Report

    2017

    In-text: (Zurkus, 2017)

    Your Bibliography: Zurkus, K., 2017. Zero Day Attacks, Vulnerabilities, Exploits Report. [online] Cybersecurity Ventures. Available at: <https://cybersecurityventures.com/zero-day-exploits-diary/> [Accessed 6 May 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join