Cite This Page
Bibliographic details for Scenario 12: Cyber operations against computer data
- Page name: Scenario 12: Cyber operations against computer data
- Author: International cyber law: interactive toolkit contributors
- Publisher: International cyber law: interactive toolkit, .
- Date of last revision: 25 January 2019 17:25 UTC
- Date retrieved: 3 June 2023 04:56 UTC
- Permanent URL: https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136
- Page Version ID: 1136
Citation styles for Scenario 12: Cyber operations against computer data
APA style
Scenario 12: Cyber operations against computer data. (2019, January 25). International cyber law: interactive toolkit, . Retrieved 04:56, June 3, 2023 from https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136.
MLA style
"Scenario 12: Cyber operations against computer data." International cyber law: interactive toolkit, . 25 Jan 2019, 17:25 UTC. 3 Jun 2023, 04:56 <https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136>.
MHRA style
International cyber law: interactive toolkit contributors, 'Scenario 12: Cyber operations against computer data', International cyber law: interactive toolkit, , 25 January 2019, 17:25 UTC, <https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136> [accessed 3 June 2023]
Chicago style
International cyber law: interactive toolkit contributors, "Scenario 12: Cyber operations against computer data," International cyber law: interactive toolkit, , https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136 (accessed June 3, 2023).
CBE/CSE style
International cyber law: interactive toolkit contributors. Scenario 12: Cyber operations against computer data [Internet]. International cyber law: interactive toolkit, ; 2019 Jan 25, 17:25 UTC [cited 2023 Jun 3]. Available from: https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136.
Bluebook style
Scenario 12: Cyber operations against computer data, https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136 (last visited June 3, 2023).
BibTeX entry
@misc{ wiki:xxx, author = "International cyber law: interactive toolkit", title = "Scenario 12: Cyber operations against computer data --- International cyber law: interactive toolkit{,} ", year = "2019", url = "https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136", note = "[Online; accessed 3-June-2023]" }
When using the LaTeX package url (\usepackage{url}
somewhere in the preamble) which tends to give much more nicely formatted web addresses, the following may be preferred:
@misc{ wiki:xxx, author = "International cyber law: interactive toolkit", title = "Scenario 12: Cyber operations against computer data --- International cyber law: interactive toolkit{,} ", year = "2019", url = "\url{https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=1136}", note = "[Online; accessed 3-June-2023]" }