Cite This Item

Copy Citation

MLA
“VAM METHODOLOGY AND OTHER DoD PRACTICES IN RISK ASSESSMENT.” Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, by Philip S. Antón et al., 1st ed., RAND Corporation, Santa Monica, CA; Arlington, VA; Pittsburgh, PA, 2003, pp. 9–24, www.jstor.org/stable/10.7249/mr1601darpa.11. Accessed 18 Jan. 2021.
APA
Antón, P., Anderson, R., Mesic, R., & Scheiern, M. (2003). VAM METHODOLOGY AND OTHER DoD PRACTICES IN RISK ASSESSMENT. In Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology (pp. 9-24). Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation. Retrieved January 18, 2021, from http://www.jstor.org/stable/10.7249/mr1601darpa.11
CHICAGO
Antón, Philip S., Robert H. Anderson, Richard Mesic, and Michael Scheiern. "VAM METHODOLOGY AND OTHER DoD PRACTICES IN RISK ASSESSMENT." In Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, 9-24. Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation, 2003. Accessed January 18, 2021. http://www.jstor.org/stable/10.7249/mr1601darpa.11.

Export Citation

Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.