MLA
Leccisotti, Flavia Zappa, et al. "Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today." Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, edited by Metodi Hadji-Janev and Mitko Bogdanoski, IGI Global, 2016, pp. 102-126. https://doi.org/10.4018/978-1-4666-8793-6.ch005
APA
Leccisotti, F. Z., Chiesa, R., De Scalzi, N., Gudas, L., & De Nicolo, D. (2016). Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today. In M. Hadji-Janev & M. Bogdanoski (Eds.), Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (pp. 102-126). IGI Global. https://doi.org/10.4018/978-1-4666-8793-6.ch005
Chicago
Leccisotti, Flavia Zappa, et al. "Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today." In Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, edited by Metodi Hadji-Janev and Mitko Bogdanoski, 102-126. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8793-6.ch005
Export Reference