This document contains a bibliography with 5 sources that relate to topics in cybersecurity such as software piracy, phishing, plagiarism, Trojan horses, and general cybersecurity information. The sources are from websites like answers.com, dreamstime.com, oliveharveycollegelibraryguides.com, webadvices.com, and searchsecurity.techtarget.com and were accessed between 2010-2014.
1 of 9
Downloaded 13 times
More Related Content
Internet Security
9. Bibliography
answers. (2010, 5 23). software piracy. Retrieved 1 6, 2014, from answers:
http://www.answers.com/topic/piracy
dreamstime. (2013, 5 29). enter keyword or file ID. Retrieved 1 7, 2014, from
dreamstime: http://www.dreamstime.com/royalty-free-stock-imagestechnology-phishing-concept-image28198889
mmcneal1@ccc.edu. (2012, 11 15). What is Plagiarism? Retrieved 1 6, 2014,
from oliveharveycollegelibraryguides:
http://oliveharveycollegelibraryguides.pbworks.com/w/page/47192856/Plag
iarism
Plaban. (2012, 9 9). What Is Trojan Horse? . Retrieved 1 6, 2014, from
webadvices.com: http://www.webadvices.com/2012/08/trojan-horsedefinition-removal-process.html
searchsecurity. (2014, 1 1). techtarget. Retrieved 1 8, 2014, from
searchsecurity: http://searchsecurity.techtarget.com/