Cite This Item

Copy Citation

MLA
“DIRECT AND INDIRECT SECURITY TECHNIQUES.” Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, by Philip S. Antón et al., 1st ed., RAND Corporation, Santa Monica, CA; Arlington, VA; Pittsburgh, PA, 2003, pp. 37–48, www.jstor.org/stable/10.7249/mr1601darpa.13. Accessed 18 Jan. 2021.
APA
Antón, P., Anderson, R., Mesic, R., & Scheiern, M. (2003). DIRECT AND INDIRECT SECURITY TECHNIQUES. In Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology (pp. 37-48). Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation. Retrieved January 18, 2021, from http://www.jstor.org/stable/10.7249/mr1601darpa.13
CHICAGO
Antón, Philip S., Robert H. Anderson, Richard Mesic, and Michael Scheiern. "DIRECT AND INDIRECT SECURITY TECHNIQUES." In Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, 37-48. Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation, 2003. Accessed January 18, 2021. http://www.jstor.org/stable/10.7249/mr1601darpa.13.

Export Citation

Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.