“E-MAIL THREATS AND ATTACKS.” Email Security: A Pocket Guide, by STEVEN FURNELL and PAUL DOWLAND, IT Governance Publishing, Ely, Cambridgeshire, 2010, pp. 19–33. JSTOR, www.jstor.org/stable/j.ctt5hh575.8. Accessed 17 Jan. 2021.
FURNELL, S., & DOWLAND, P. (2010). E-MAIL THREATS AND ATTACKS. In Email Security: A Pocket Guide (pp. 19-33). Ely, Cambridgeshire: IT Governance Publishing. Retrieved January 17, 2021, from http://www.jstor.org/stable/j.ctt5hh575.8
FURNELL, STEVEN, and PAUL DOWLAND. "E-MAIL THREATS AND ATTACKS." In Email Security: A Pocket Guide, 19-33. Ely, Cambridgeshire: IT Governance Publishing, 2010. Accessed January 17, 2021. http://www.jstor.org/stable/j.ctt5hh575.8.
Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.