BEŞLIU, D.C. (2017). Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6(2), 35-39. Retrieve from https://www.ijisc.comBEŞLIU, D.C., 2017. Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6(2), 35-39. Available from: https://www.ijisc.comD.C. BEŞLIU, "Cyber Terrorism – A Growing Threat in the Field of Cyber Security," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 35-39, 2017. Available: https://www.ijisc.comBEŞLIU, D.C., 'Cyber Terrorism – A Growing Threat in the Field of Cyber Security', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 35-39, (2017).BEŞLIU, D.C.: Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6 (2017) 35-39. https://www.ijisc.comBEŞLIU, D.C., (2017), Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6: 35-39. https://www.ijisc.com Citation Format :
PEȚA, C. (2013). Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2(2), 55-60. Retrieve from https://www.ijisc.comPEȚA, C., 2013. Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2(2), 55-60. Available from: https://www.ijisc.comC. PEȚA, "Legislative Aspects of Cybersecurity," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 55-60, 2013. Available: https://www.ijisc.comPEȚA, C., 'Legislative Aspects of Cybersecurity', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 55-60, (2013).PEȚA, C.: Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2 (2013) 55-60. https://www.ijisc.comPEȚA, C., (2013), Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2: 55-60. https://www.ijisc.com Citation Format :