Cite This Item

Copy Citation

MLA
“NEXT STEPS AND DISCUSSION.” Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, by Philip S. Antón et al., 1st ed., RAND Corporation, Santa Monica, CA; Arlington, VA; Pittsburgh, PA, 2003, pp. 79–82, www.jstor.org/stable/10.7249/mr1601darpa.16. Accessed 16 Jan. 2021.
APA
Antón, P., Anderson, R., Mesic, R., & Scheiern, M. (2003). NEXT STEPS AND DISCUSSION. In Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology (pp. 79-82). Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation. Retrieved January 16, 2021, from http://www.jstor.org/stable/10.7249/mr1601darpa.16
CHICAGO
Antón, Philip S., Robert H. Anderson, Richard Mesic, and Michael Scheiern. "NEXT STEPS AND DISCUSSION." In Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, 79-82. Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation, 2003. Accessed January 16, 2021. http://www.jstor.org/stable/10.7249/mr1601darpa.16.

Export Citation

Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.