MLA
Du, Jun, et al. "A Security Blueprint for E-Business Applications." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 3020-3030. https://doi.org/10.4018/978-1-59904-937-3.ch202
APA
Du, J., Jiao, Y., & Jiao, J. R. (2008). A Security Blueprint for E-Business Applications. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 3020-3030). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch202
Chicago
Du, Jun, Yuan-Yuan Jiao, and Jianxin ("Roger") Jiao. "A Security Blueprint for E-Business Applications." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 3020-3030. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch202
Export Reference