“CONCLUSIONS.” Mobile Security: A Pocket Guide, by STEVEN FURNELL, IT Governance Publishing, Ely, Cambridgeshire, United Kingdom, 2009, pp. 74–74, www.jstor.org/stable/j.ctt5hh772.13. Accessed 27 Jan. 2021.
FURNELL, S. (2009). CONCLUSIONS. In Mobile Security: A Pocket Guide (p. 74). Ely, Cambridgeshire, United Kingdom: IT Governance Publishing. Retrieved January 27, 2021, from http://www.jstor.org/stable/j.ctt5hh772.13
FURNELL, STEVEN. "CONCLUSIONS." In Mobile Security: A Pocket Guide, 74. Ely, Cambridgeshire, United Kingdom: IT Governance Publishing, 2009. Accessed January 27, 2021. http://www.jstor.org/stable/j.ctt5hh772.13.
Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.