These are the sources and citations used to research Unit 6.1. This bibliography was generated on Cite This For Me on
In-text: (Internet security threat report, 2016)
Your Bibliography: Internet security threat report. (2016). [ebook] Symantic, pp.18.104.22.168. Available at: https://www.symantec.com/security-center/threat-report [Accessed 29 Dec. 2017].
In-text: (Gardner, 2011)
Your Bibliography: Gardner, J. (2011). Bera. [online] Content.yudu.com. Available at: http://content.yudu.com/Library/A2xnp5/Bera/resources/index.htm?referrerUrl=http://free.yudu.com/item/details/2023387/Bera [Accessed 28 Dec. 2017].
In-text: (Md. Nasimuzzaman Chowdhury, Md. Shiblee Nooman, Srijon Sarker, 2018)
Your Bibliography: Md. Nasimuzzaman Chowdhury, Md. Shiblee Nooman, Srijon Sarker (2018). Access Control of Door and Home Security By Raspberry Pi Through Internet. [online] Available at: https://www.ijser.org/researchpaper/Access-Control-of-Door-and-Home-Security-By-Raspberry-Pi-Through-Internet.pdf [Accessed 28 Dec. 2017].
In-text: (M.K. Trochim, 2018)
Your Bibliography: M.K. Trochim, W. (2018). Social Research Methods - Knowledge Base - Nonprobability Sampling. [online] Socialresearchmethods.net. Available at: https://www.socialresearchmethods.net/kb/sampnon.php [Accessed 28 Dec. 2017].
10,587 students joined last month!