These are the sources and citations used to research BIBLIOGRAPHIE. This bibliography was generated on Cite This For Me on

  • Website

    Beekmans, G.

    Linux.com :: Ping: ICMP vs. ARP

    2015

    In-text: (Beekmans, 2015)

    Your Bibliography: Beekmans, G., 2015. Linux.com :: Ping: ICMP vs. ARP. [online] Archive09.linux.com. Available at: <http://archive09.linux.com/articles/50596> [Accessed 4 September 2014].

  • Website

    Brandon, J.

    6 security threats more deadly than Heartbleed or Shellshock

    2014

    In-text: (Brandon, 2014)

    Your Bibliography: Brandon, J., 2014. 6 security threats more deadly than Heartbleed or Shellshock. [online] TechRadar. Available at: <http://www.techradar.com/news/world-of-tech/6-security-threats-more-deadly-than-heartbleed-or-shellshock-1268481/1> [Accessed 16 October 2014].

  • Website

    Buso, B.

    5 Computer Hacks from Movies You Won't Believe Are Possible

    2012

    In-text: (Buso, 2012)

    Your Bibliography: Buso, B., 2012. 5 Computer Hacks from Movies You Won't Believe Are Possible. [online] Cracked.com. Available at: <http://www.cracked.com/article_19754_5-computer-hacks-from-movies-you-wont-believe-are-possible.html> [Accessed 31 April 2014].

  • Website

    Cerrudo, C.

    IOActive Labs Research: Hacking US (and UK, Australia, France, etc.) Traffic Control Systems

    2014

    In-text: (Cerrudo, 2014)

    Your Bibliography: Cerrudo, C., 2014. IOActive Labs Research: Hacking US (and UK, Australia, France, etc.) Traffic Control Systems. [online] Blog.ioactive.com. Available at: <http://blog.ioactive.com/2014/04/hacking-us-and-uk-australia-france-etc.html> [Accessed 22 April 2014].

  • Website

    Choy, D.

    Emma Watson Nude: Threat Hoax Intended To Take Down 4Chan? [REPORT,VIDEO]

    2015

    In-text: (Choy, 2015)

    Your Bibliography: Choy, D., 2015. Emma Watson Nude: Threat Hoax Intended To Take Down 4Chan? [REPORT,VIDEO]. [online] Latin Times. Available at: <http://www.latintimes.com/emma-watson-nude-threat-hoax-intended-take-down-4chan-reportvideo-263915> [Accessed 1 October 2014].

  • Website

    Features

    2015

    In-text: (Features, 2015)

    Your Bibliography: dSploit. 2015. Features. [online] Available at: <http://dsploit.net/features/> [Accessed 18 April 2014].

  • Conference proceedings

    Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J. and Halderman, J. A.

    Green Lights Forever: Analyzing the Security of Traffic Infrastructure

    2014 - Proceedings of the 8th USENIX Workshop on Offensive Technologies

    In-text: (Ghena et al., 2014)

    Your Bibliography: Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J. and Halderman, J., 2014. Green Lights Forever: Analyzing the Security of Traffic Infrastructure. In: Proceedings of the 8th USENIX Workshop on Offensive Technologies. [online] pp.1-8. Available at: <https://jhalderm.com/pub/papers/traffic-woot14.pdf> [Accessed 2 November 2014].

  • Website

    Gurman, M.

    Apple denies iCloud/Find my iPhone breach, says 'very targeted attack' hit certain celebrities

    2014

    In-text: (Gurman, 2014)

    Your Bibliography: Gurman, M., 2014. Apple denies iCloud/Find my iPhone breach, says 'very targeted attack' hit certain celebrities. [online] 9to5Mac. Available at: <http://9to5mac.com/2014/09/02/apple-confirms-very-targeted-attack-on-celebrities-denies-icloud-breach/> [Accessed 10 September 2014].

  • Website

    Gurman, M.

    Tim Cook addresses iCloud photos hacking, says major security improvements coming soon

    2014

    In-text: (Gurman, 2014)

    Your Bibliography: Gurman, M., 2014. Tim Cook addresses iCloud photos hacking, says major security improvements coming soon. [online] 9to5Mac. Available at: <http://9to5mac.com/2014/09/04/tim-cook-addresses-icloud-photos-hacking-says-major-security-improvements-coming-soon/> [Accessed 10 September 2014].

  • Website

    Hunt, T.

    Troy Hunt: Everything you need to know about the Heartbleed SSL bug

    2014

    In-text: (Hunt, 2014)

    Your Bibliography: Hunt, T., 2014. Troy Hunt: Everything you need to know about the Heartbleed SSL bug. [online] Troy Hunt. Available at: <http://www.troyhunt.com/2014/04/everything-you-need-to-know-about.html> [Accessed 25 September 2014].

  • Website

    Jacobs, S.

    Traffic Light Study Reveals Serious Hacking Risk | MIT Technology Review

    2014

    In-text: (Jacobs, 2014)

    Your Bibliography: Jacobs, S., 2014. Traffic Light Study Reveals Serious Hacking Risk | MIT Technology Review. [online] MIT Technology Review. Available at: <http://www.technologyreview.com/news/530216/researchers-hack-into-michigans-traffic-lights/> [Accessed 13 October 2014].

  • Website

    Cyberoam Knowledge Base

    2015

    In-text: (Cyberoam Knowledge Base, 2015)

    Your Bibliography: Kb.cyberoam.com. 2015. Cyberoam Knowledge Base. [online] Available at: <http://kb.cyberoam.com/default.asp?id=2909&Lang=1> [Accessed 25 September 2014].

  • Website

    Lewis, D.

    Biometric Security And Bowie Knives

    2014

    In-text: (Lewis, 2014)

    Your Bibliography: Lewis, D., 2014. Biometric Security And Bowie Knives. [online] Forbes. Available at: <http://www.forbes.com/sites/davelewis/2014/09/23/biometric-security-and-bowie-knives/> [Accessed 10 October 2014].

  • Website

    Lewis, D.

    iCloud Data Breach: Hacking And Celebrity Photos

    2014

    In-text: (Lewis, 2014)

    Your Bibliography: Lewis, D., 2014. iCloud Data Breach: Hacking And Celebrity Photos. [online] Forbes. Available at: <http://www.forbes.com/sites/davelewis/2014/09/02/icloud-data-breach-hacking-and-nude-celebrity-photos/> [Accessed 2 September 2014].

  • Software

    Margaritelli, S.

    dSploit

    2014

    In-text: (Margaritelli, 2014)

    Your Bibliography: Margaritelli, S., 2014. dSploit.

  • Website

    McMillan, R.

    The Internet Is Broken, and Shellshock Is Just the Start of Our Woes | WIRED

    2014

    In-text: (McMillan, 2014)

    Your Bibliography: McMillan, R., 2014. The Internet Is Broken, and Shellshock Is Just the Start of Our Woes | WIRED. [online] WIRED. Available at: <http://www.wired.com/2014/09/shellshocked-bash/?utm_source=zergnet.com&utm_medium=referral&utm_campaign=zergnet_277923&mbid=synd_zergnet> [Accessed 18 October 2014].

  • E-book or PDF

    Möller, B., Duong, T. and Kotowicz, K.

    This POODLE Bites: Exploiting The SSL 3.0 Fallback

    2014 - Google

    In-text: (Möller, Duong and Kotowicz, 2014)

    Your Bibliography: Möller, B., Duong, T. and Kotowicz, K., 2014. This POODLE Bites: Exploiting The SSL 3.0 Fallback. 1st ed. [ebook] Google, p.4. Available at: <https://www.openssl.org/~bodo/ssl-poodle.pdf> [Accessed 24 October 2014].

  • Website

    Puente, M.

    Celeb nude photo-hack victims threaten to sue Google

    2015

    In-text: (Puente, 2015)

    Your Bibliography: Puente, M., 2015. Celeb nude photo-hack victims threaten to sue Google. [online] Usatoday.com. Available at: <http://www.usatoday.com/story/life/people/2014/10/02/celeb-nude-photo-hack-victims-threaten-to-sue-google/16588007/> [Accessed 10 October 2014].

  • Website

    Shankdhar, P.

    Security and Hacking apps for Android devices - InfoSec Institute

    2013

    In-text: (Shankdhar, 2013)

    Your Bibliography: Shankdhar, P., 2013. Security and Hacking apps for Android devices - InfoSec Institute. [online] InfoSec Institute. Available at: <http://resources.infosecinstitute.com/security-hacking-apps-android/> [Accessed 10 May 2014].

  • Website

    The Fappening

    2015

    In-text: (The Fappening, 2015)

    Your Bibliography: Thepiratebay.cr. 2015. The Fappening. [online] Available at: <http://thepiratebay.cr/search.php?q=the+fappening&page=0&orderby=99> [Accessed 20 November 2014].

  • Website

    JavaScript Injection (Tutorials) - ThisisLegal.com

    2015

    In-text: (JavaScript Injection (Tutorials) - ThisisLegal.com, 2015)

    Your Bibliography: Thisislegal.com. 2015. JavaScript Injection (Tutorials) - ThisisLegal.com. [online] Available at: <http://www.thisislegal.com/tutorials/7> [Accessed 1 January 2015].

  • Website

    Heartbleed

    2015

    In-text: (Heartbleed, 2015)

    Your Bibliography: Wikipedia. 2015. Heartbleed. [online] Available at: <http://en.wikipedia.org/wiki/Heartbleed> [Accessed 25 September 2014].

  • Website

    McGurk effect

    2015

    In-text: (McGurk effect, 2015)

    Your Bibliography: Wikipedia. 2015. McGurk effect. [online] Available at: <http://en.wikipedia.org/wiki/McGurk_effect> [Accessed 9 January 2015].

  • Website

    Winkapp

    2015

    In-text: (Winkapp, 2015)

    Your Bibliography: Winkapp. 2015. Winkapp. [online] Available at: <http://www.winkapp.co/> [Accessed 28 September 2014].

  • Website

    zANTI - Mobile Security Risk Assessment | Zimperium

    2015

    In-text: (zANTI - Mobile Security Risk Assessment | Zimperium, 2015)

    Your Bibliography: Zimperium.com. 2015. zANTI - Mobile Security Risk Assessment | Zimperium. [online] Available at: <https://www.zimperium.com/zanti-mobile-penetration-testing> [Accessed 28 December 2014].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join