MLA
Mead, N. R. "Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method." Integrating Security and Software Engineering: Advances and Future Visions, edited by Haralambos Mouratidis and Paolo Giorgini, IGI Global, 2007, pp. 43-69. https://doi.org/10.4018/978-1-59904-147-6.ch003
APA
Mead, N. R. (2007). Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method. In H. Mouratidis & P. Giorgini (Eds.), Integrating Security and Software Engineering: Advances and Future Visions (pp. 43-69). IGI Global. https://doi.org/10.4018/978-1-59904-147-6.ch003
Chicago
Mead, N. R. "Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method." In Integrating Security and Software Engineering: Advances and Future Visions, edited by Haralambos Mouratidis and Paolo Giorgini, 43-69. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59904-147-6.ch003
Export Reference
