These are the sources and citations used to research IA assignement. This bibliography was generated on Cite This For Me on

  • Website

    Arora, H.

    Introduction to Cryptography Basic Principles

    2012

    In-text: (Arora, 2012)

    Your Bibliography: Arora, H., 2012. Introduction to Cryptography Basic Principles. [online] Thegeekstuff.com. Available at: <https://www.thegeekstuff.com/2012/07/cryptography-basics/> [Accessed 14 January 2022].

  • Website

    Cheach, D.

    Basics of Cryptography

    2019

    In-text: (Cheach, 2019)

    Your Bibliography: Cheach, D., 2019. Basics of Cryptography. [online] Medium. Available at: <https://medium.com/@tattwei46/basics-of-cryptography-18d01b952dde> [Accessed 13 January 2022].

  • Website

    What is MITM (Man in the Middle) Attack | Imperva

    In-text: (What is MITM (Man in the Middle) Attack | Imperva, n.d.)

    Your Bibliography: Learning Center. n.d. What is MITM (Man in the Middle) Attack | Imperva. [online] Available at: <https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/> [Accessed 14 January 2022].

  • Website

    Walkowski, D.

    What Is The CIA Triad?

    2019

    In-text: (Walkowski, 2019)

    Your Bibliography: Walkowski, D., 2019. What Is The CIA Triad?. [online] F5 Labs. Available at: <https://www.f5.com/labs/articles/education/what-is-the-cia-triad> [Accessed 15 November 2021].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join