These are the sources and citations used to research Research Project 1. This bibliography was generated on Cite This For Me on
In-text: (Visio Pro, 2016)
Your Bibliography: 2016. Visio Pro. Microsoft Corporation.
In-text: (HouseCall, 2022)
Your Bibliography: 2022. HouseCall. Trend Micro, Inc.
In-text: (Norton 360, 2022)
Your Bibliography: 2022. Norton 360. NortonLifeLock Inc.
In-text: (Briere and Hurley, 2013)
Your Bibliography: Briere, D. and Hurley, 2013. Smart homes for dummies. 3rd ed. Hoboken, N.J.: John Wiley & Sons.
In-text: (Charles J. Brooks., Christopher Grow., Philip A. Craig and Donald Short., 2018)
Your Bibliography: Charles J. Brooks., Christopher Grow., Philip A. Craig, J. and Donald Short., 2018. Cybersecurity Essentials. 1st ed. Sybex.
In-text: (Costa, Barros and Tavares, 2019)
Your Bibliography: Costa, L., Barros, J. and Tavares, M., 2019. Vulnerabilities in IoT Devices for Smart Home Environment. Proceedings of the 5th International Conference on Information Systems Security and Privacy,.
In-text: (Cyril Jose and Malekian, 2015)
Your Bibliography: Cyril Jose, A. and Malekian, R., 2015. Smart Home Automation Security: A Literature Review. The Smart Computing Review, 5(4).
In-text: (Getorro, 2022)
Your Bibliography: Getorro.com. 2022. Getorro. [online] Available at: <https://getorro.com/blog-how-smart-homes-make-life-better> [Accessed 2 April 2022].
In-text: (Smart Home, 2022)
Your Bibliography: Investopedia. 2022. Smart Home. [online] Available at: <https://www.investopedia.com/terms/s/smart-home.asp> [Accessed 4 April 2022].
In-text: (Johnson, 2018)
Your Bibliography: Johnson, A., 2018. CCNA cybersecurity operations. 1st ed. Cisco Networking Academy.
In-text: (Kohnke, Shoemaker and Sigler, 2016)
Your Bibliography: Kohnke, A., Shoemaker, D. and Sigler, K., 2016. The complete guide to cybersecurity risks and controls. Crc Press.
In-text: (Kyas, 2015)
Your Bibliography: Kyas, O., 2015. How To Smart Home. 3rd ed. [Colorado Springs, CO]: Key Concept Press.
In-text: (Meeuwisse, 2017)
Your Bibliography: Meeuwisse, R., 2017. Cybersecurity for beginners. 2nd ed. Hythe, Kent: Cyber Simplicity Ltd.
In-text: (Neil, 2018)
Your Bibliography: Neil, I., 2018. CompTIA security+. Birmingham: Packt.
In-text: (Rai, Chukwuma and Cozart, 2017)
Your Bibliography: Rai, S., Chukwuma, P. and Cozart, R., 2017. Security and auditing of smart devices. Crc Press.
In-text: (Vandome, 2018)
Your Bibliography: Vandome, N., 2018. Smart Homes in easy steps. In Easy Steps Limited.
In-text: (Walliman, 2011)
Your Bibliography: Walliman, N., 2011. Your research project. London: Sage Publications.
In-text: (Waschke, 2017)
Your Bibliography: Waschke, M., 2017. Personal Cybersecurity. Apress.
In-text: (Williamson, 2002)
Your Bibliography: Williamson, K., 2002. Research methods for students, academics and professionals. Wagga Wagga: Charles Sturt University, Centre for Information Studies (CIS).
10,587 students joined last month!