Cite This Item

Copy Citation

MLA
“FIGURES.” Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, by Philip S. Antón et al., 1st ed., RAND Corporation, Santa Monica, CA; Arlington, VA; Pittsburgh, PA, 2003, pp. ix-x, www.jstor.org/stable/10.7249/mr1601darpa.4. Accessed 20 Jan. 2021.
APA
Antón, P., Anderson, R., Mesic, R., & Scheiern, M. (2003). FIGURES. In Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology (pp. Ix-X). Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation. Retrieved January 20, 2021, from http://www.jstor.org/stable/10.7249/mr1601darpa.4
CHICAGO
Antón, Philip S., Robert H. Anderson, Richard Mesic, and Michael Scheiern. "FIGURES." In Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, Ix-X. Santa Monica, CA; Arlington, VA; Pittsburgh, PA: RAND Corporation, 2003. Accessed January 20, 2021. http://www.jstor.org/stable/10.7249/mr1601darpa.4.

Export Citation

Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley…)
Export a Text file (For BibTex)
Note: Always review your references and make any necessary corrections before using. Pay attention to names, capitalization, and dates.