MLA
Mead, N. R. "Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 943-963. https://doi.org/10.4018/978-1-59904-937-3.ch065
APA
Mead, N. R. (2008). Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 943-963). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch065
Chicago
Mead, N. R. "Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 943-963. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch065
Export Reference
