MLA
Chaka, John Gyang and Mudaray Marimuthu. "Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution." Cloud Security: Concepts, Methodologies, Tools, and Applications. IGI Global, 2019. 1-30. Web. 5 Dec. 2019. doi:10.4018/978-1-5225-8176-5.ch001
APA
Chaka, J. G., & Marimuthu, M. (2019). Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 1-30). Hershey, PA: IGI Global. doi:10.4018/978-1-5225-8176-5.ch001
Chicago
Chaka, John Gyang and Mudaray Marimuthu. "Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution." In Cloud Security: Concepts, Methodologies, Tools, and Applications, ed. Information Resources Management Association, 1-30 (2019), accessed December 05, 2019. doi:10.4018/978-1-5225-8176-5.ch001
Export Reference