These are the sources and citations used to research Security Engineering Bibliography. This bibliography was generated on Cite This For Me on

  • Journal

    A Alattas, K. and Bayoumi, M.

    Reviewing the Existing Methodologies and Tools of Cloud Forensics: Challenges and Solutions

    2020 - International Journal of Cyber-Security and Digital Forensics

    In-text: (A Alattas and Bayoumi, 2020)

    Your Bibliography: A Alattas, K. and Bayoumi, M., 2020. Reviewing the Existing Methodologies and Tools of Cloud Forensics: Challenges and Solutions. International Journal of Cyber-Security and Digital Forensics, [online] 9(4), pp.147-154. Available at: <https://go-gale-com.ezproxy.libproxy.db.erau.edu/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&hitCount=2&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA676632381&docType=Article&sort=Relevance&contentSegment=ZONE-MOD1&prodId=AONE&pageNum=1&contentSet=GALE%7CA676632381&searchId=R1&userGroupName=embry&inPS=true>.

  • Journal

    Avram, M.

    Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective

    2014 - Procedia Technology

    In-text: (Avram, 2014)

    Your Bibliography: Avram, M., 2014. Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective. Procedia Technology, [online] 12, pp.529-534. Available at: <https://www.sciencedirect.com/science/article/pii/S221201731300710X> [Accessed 12 June 2022].

  • Website

    7 Firewall Best Practices for Securing Your Network – BackBox Software

    2022

    In-text: (7 Firewall Best Practices for Securing Your Network – BackBox Software, 2022)

    Your Bibliography: BackBox Software. 2022. 7 Firewall Best Practices for Securing Your Network – BackBox Software. [online] Available at: <https://backbox.com/7-firewall-best-practices-for-securing-your-network/> [Accessed 1 July 2022].

  • Journal

    Busch, C.

    Facing the future of biometrics

    2006 - EMBO reports

    In-text: (Busch, 2006)

    Your Bibliography: Busch, C., 2006. Facing the future of biometrics. EMBO reports, 7(S1).

  • Website

    Difference between Virtual Machines and Containers - GeeksforGeeks

    2022

    In-text: (Difference between Virtual Machines and Containers - GeeksforGeeks, 2022)

    Your Bibliography: GeeksforGeeks. 2022. Difference between Virtual Machines and Containers - GeeksforGeeks. [online] Available at: <https://www.geeksforgeeks.org/difference-between-virtual-machines-and-containers/> [Accessed 12 June 2022].

  • Website

    Gillis, A.

    What is Cloud Networking? Definition from SearchNetworking

    2022

    In-text: (Gillis, 2022)

    Your Bibliography: Gillis, A., 2022. What is Cloud Networking? Definition from SearchNetworking. [online] SearchNetworking. Available at: <https://www.techtarget.com/searchnetworking/definition/cloud-networking> [Accessed 12 June 2022].

  • Website

    Griffith, E.

    What Is Cloud Computing?

    2022

    In-text: (Griffith, 2022)

    Your Bibliography: Griffith, E., 2022. What Is Cloud Computing?. [online] PCMAG. Available at: <https://www.pcmag.com/how-to/what-is-cloud-computing> [Accessed 12 June 2022].

  • Website

    IaaS, PaaS, SaaS – Cloud Service Model Overview – Intel

    2022

    In-text: (IaaS, PaaS, SaaS – Cloud Service Model Overview – Intel, 2022)

    Your Bibliography: Intel. 2022. IaaS, PaaS, SaaS – Cloud Service Model Overview – Intel. [online] Available at: <https://www.intel.com/content/www/us/en/cloud-computing/as-a-service.html?cid=sem&source=sa360&campid=2022_q2_dcai_us_dcaicsgmo_dcaicsg_awa_text-link_generic_exact_cd_DCAI-Cloud_3002188038_google_b2b_is_pbm_intel&ad_group=generic_Cloud+As+a+Service_b2b1-awa&intel_term=paas+cloud&sa360id=43700070635332379&gclid=CjwKCAjwnZaVBhA6EiwAVVyv9IUKtjti9kuhTesH70DiDPRUYI34KxLr8VG5eGH5bAl3gENsCVxrDRoCJOAQAvD_BwE&gclsrc=aw.ds> [Accessed 12 June 2022].

  • Journal

    Khoda Parast, F., Sindhav, C., Nikam, S., Izadi Yekta, H., Kent, K. B. and Hakak, S.

    Cloud computing security: A survey of service-based models

    2022 - Computers &amp; Security

    In-text: (Khoda Parast et al., 2022)

    Your Bibliography: Khoda Parast, F., Sindhav, C., Nikam, S., Izadi Yekta, H., Kent, K. and Hakak, S., 2022. Cloud computing security: A survey of service-based models. Computers &amp; Security, [online] 114, p.102580. Available at: <https://www-sciencedirect-com.ezproxy.libproxy.db.erau.edu/science/article/pii/S0167404821003977> [Accessed 12 June 2022].

  • Website

    Ohri, A.

    Docker in Cloud Computing - A Simple Overview (2021)

    2022

    In-text: (Ohri, 2022)

    Your Bibliography: Ohri, A., 2022. Docker in Cloud Computing - A Simple Overview (2021). [online] Jigsawacademy.com. Available at: <https://www.jigsawacademy.com/blogs/cloud-computing/docker-in-cloud-computing/> [Accessed 12 June 2022].

  • Website

    Cisco Firewall Best Practices

    2022

    In-text: (Cisco Firewall Best Practices, 2022)

    Your Bibliography: Tools.cisco.com. 2022. Cisco Firewall Best Practices. [online] Available at: <https://tools.cisco.com/security/center/resources/firewall_best_practices> [Accessed 1 July 2022].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join