Tuesday, 31 May 2016

Referencing/ Biblography for overall posts

References Debono, M., 2013. Some Sneaky Ways Hackers Use to Try And Steal Information (and how to counteract them). [Online] Available at: http://www.reqtest.com/general/some-sneaky-ways-hackers-use-to-try-and-steal-information-and-how-to-counteract-them/ [Accessed 22 May 2016]. Huddleston, C., 2013. 6 Ways You Invite Hackers to Steal Your Personal Information. [Online] Available at: http://www.m.kiplinger.com/article/credit/T048-C011-S001-6-ways-you-invite-hackers-to-steal-your-personal-i.html [Accessed 20 May 2016]. Rouse, M., 2016. What is identity theft?. [Online] Available at: http://www.searchsecurity.techtarget.com/definition/identity-theft [Accessed 17 May 2016]. Schwartz, M., 2012. 8 ways to Avoid Getting Your Life Hacked. [Online] Available at: http://www.darkreading.com/attacks-and-breaches/8-ways-to-avoid-getting-your-life-hacked/d/d-id/1105707 [Accessed 23 May 2016]. V, B., 2016. Computer Virus (virus). [Online] Available at: http://www.webopedia.com/TERM/V/virus.html [Accessed 17 May 2016]. Weisseman, C., 2015. 7 easy ways to avoid being hacked. [Online] Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4 [Accessed 22 May 2016].

No comments:

Post a Comment