Tuesday, 31 May 2016
Referencing/ Biblography for overall posts
References
Debono, M., 2013. Some Sneaky Ways Hackers Use to Try And Steal Information (and how to counteract them). [Online]
Available at: http://www.reqtest.com/general/some-sneaky-ways-hackers-use-to-try-and-steal-information-and-how-to-counteract-them/
[Accessed 22 May 2016].
Huddleston, C., 2013. 6 Ways You Invite Hackers to Steal Your Personal Information. [Online]
Available at: http://www.m.kiplinger.com/article/credit/T048-C011-S001-6-ways-you-invite-hackers-to-steal-your-personal-i.html
[Accessed 20 May 2016].
Rouse, M., 2016. What is identity theft?. [Online]
Available at: http://www.searchsecurity.techtarget.com/definition/identity-theft
[Accessed 17 May 2016].
Schwartz, M., 2012. 8 ways to Avoid Getting Your Life Hacked. [Online]
Available at: http://www.darkreading.com/attacks-and-breaches/8-ways-to-avoid-getting-your-life-hacked/d/d-id/1105707
[Accessed 23 May 2016].
V, B., 2016. Computer Virus (virus). [Online]
Available at: http://www.webopedia.com/TERM/V/virus.html
[Accessed 17 May 2016].
Weisseman, C., 2015. 7 easy ways to avoid being hacked. [Online]
Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4
[Accessed 22 May 2016].
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment