These are the sources and citations used to research Network Security Proposal: Part 2. This bibliography was generated on Cite This For Me on

  • Website

    TestOut LabSim

    2018

    In-text: (Cdn.testout.com, 2018)

    Your Bibliography: Cdn.testout.com. (2018). TestOut LabSim. [online] Available at: https://cdn.testout.com/client-v5-1-10-495/startlabsim.html [Accessed 1 Mar. 2018].

  • E-book or PDF

    Durkovich, C. and Holt, B.

    Best Practices for Planning and Managing Physical Security Resources: An Interagency Security Committee Guide

    2015 - The Interagency Security Committee

    In-text: (Durkovich and Holt, 2015)

    Your Bibliography: Durkovich, C. and Holt, B. (2015). Best Practices for Planning and Managing Physical Security Resources: An Interagency Security Committee Guide. [ebook] The Interagency Security Committee, pp.20-23. Available at: https://www.dhs.gov/sites/default/files/publications/isc-planning-managing-physical-security-resources-dec-2015-508.pdf [Accessed 1 Mar. 2018].

  • Website

    Office of Management Services, S. M. O.

    Physical Security Handbook 440-2-H Chapter 4

    2017

    In-text: (Office of Management Services, 2017)

    Your Bibliography: Office of Management Services, S. (2017). Physical Security Handbook 440-2-H Chapter 4. [online] Www2.usgs.gov. Available at: https://www2.usgs.gov/usgs-manual/handbook/hb/440-2-h/440-2-h-ch4.html [Accessed 4 Mar. 2018].

  • Website

    O'Leary, D., Zimmermann, R., Grahn, A., Poarch, D., Cook, M. and Pirc, J.

    Mobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge

    2017

    In-text: (O'Leary et al., 2017)

    Your Bibliography: O'Leary, D., Zimmermann, R., Grahn, A., Poarch, D., Cook, M. and Pirc, J. (2017). Mobile Device Security in the Workplace: 5 Key Risks and a Surprising Challenge. [online] FOCUS Forsythe. Available at: http://focus.forsythe.com/articles/55/Mobile-Device-Security-in-the-Workplace-5-Key-Risks-and-a-Surprising-Challenge [Accessed 3 Mar. 2018].

  • Website

    Reichenberg, N.

    Four Tips for Designing a Secure Network Perimeter | SecurityWeek.Com

    2013

    In-text: (Reichenberg, 2013)

    Your Bibliography: Reichenberg, N. (2013). Four Tips for Designing a Secure Network Perimeter | SecurityWeek.Com. [online] Securityweek.com. Available at: https://www.securityweek.com/four-tips-designing-secure-network-perimeter [Accessed 5 Mar. 2018].

  • Website

    WEP, WPA and WPA2 and their differences.

    2018 - Netspotapp

    In-text: (Netspotapp.com, 2018)

    Your Bibliography: Netspotapp.com. (2018). WEP, WPA and WPA2 and their differences.. [online] Available at: https://www.netspotapp.com/wifi-encryption-and-security.html [Accessed 5 Mar. 2018].

  • Website

    Woland, A.

    RADIUS versus TACACS+

    2014

    In-text: (Woland, 2014)

    Your Bibliography: Woland, A. (2014). RADIUS versus TACACS+. [online] Network World. Available at: https://www.networkworld.com/article/2838882/radius-versus-tacacs.html [Accessed 5 Mar. 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join