MLA
Chaka, John Gyang, and Mudaray Marimuthu. "Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution." Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution, edited by Ziska Fields, IGI Global, 2018, pp. 112-140. https://doi.org/10.4018/978-1-5225-4763-1.ch004
APA
Chaka, J. G. & Marimuthu, M. (2018). Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution. In Z. Fields (Ed.), Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution (pp. 112-140). IGI Global. https://doi.org/10.4018/978-1-5225-4763-1.ch004
Chicago
Chaka, John Gyang, and Mudaray Marimuthu. "Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution." In Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution, edited by Ziska Fields, 112-140. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4763-1.ch004
Export Reference