MLA
Chaka, John Gyang, and Mudaray Marimuthu. "Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution." Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 1-30. https://doi.org/10.4018/978-1-5225-8176-5.ch001
APA
Chaka, J. G. & Marimuthu, M. (2019). Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 1-30). IGI Global. https://doi.org/10.4018/978-1-5225-8176-5.ch001
Chicago
Chaka, John Gyang, and Mudaray Marimuthu. "Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution." In Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1-30. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8176-5.ch001
Export Reference