“SECURING THE CLIENT.” Email Security: A Pocket Guide, by STEVEN FURNELL and PAUL DOWLAND, IT Governance Publishing, Ely, Cambridgeshire, 2010, pp. 34–45. JSTOR, www.jstor.org/stable/j.ctt5hh575.9. Accessed 13 July 2020.
FURNELL, S., & DOWLAND, P. (2010). SECURING THE CLIENT. In Email Security: A Pocket Guide (pp. 34-45). Ely, Cambridgeshire: IT Governance Publishing. Retrieved July 13, 2020, from www.jstor.org/stable/j.ctt5hh575.9
FURNELL, STEVEN, and PAUL DOWLAND. "SECURING THE CLIENT." In Email Security: A Pocket Guide, 34-45. Ely, Cambridgeshire: IT Governance Publishing, 2010. Accessed July 13, 2020. www.jstor.org/stable/j.ctt5hh575.9.
Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.