Cite This Page
Bibliographic details for Scenario 12: Cyber operations against computer data
- Page name: Scenario 12: Cyber operations against computer data
- Author: International cyber law: interactive toolkit contributors
- Publisher: International cyber law: interactive toolkit, .
- Date of last revision: 14 June 2022 15:06 UTC
- Date retrieved: 28 March 2023 05:05 UTC
- Permanent URL: https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431
- Page Version ID: 3431
Citation styles for Scenario 12: Cyber operations against computer data
APA style
Scenario 12: Cyber operations against computer data. (2022, June 14). International cyber law: interactive toolkit, . Retrieved 05:05, March 28, 2023 from https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431.
MLA style
"Scenario 12: Cyber operations against computer data." International cyber law: interactive toolkit, . 14 Jun 2022, 15:06 UTC. 28 Mar 2023, 05:05 <https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431>.
MHRA style
International cyber law: interactive toolkit contributors, 'Scenario 12: Cyber operations against computer data', International cyber law: interactive toolkit, , 14 June 2022, 15:06 UTC, <https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431> [accessed 28 March 2023]
Chicago style
International cyber law: interactive toolkit contributors, "Scenario 12: Cyber operations against computer data," International cyber law: interactive toolkit, , https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431 (accessed March 28, 2023).
CBE/CSE style
International cyber law: interactive toolkit contributors. Scenario 12: Cyber operations against computer data [Internet]. International cyber law: interactive toolkit, ; 2022 Jun 14, 15:06 UTC [cited 2023 Mar 28]. Available from: https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431.
Bluebook style
Scenario 12: Cyber operations against computer data, https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431 (last visited March 28, 2023).
BibTeX entry
@misc{ wiki:xxx, author = "International cyber law: interactive toolkit", title = "Scenario 12: Cyber operations against computer data --- International cyber law: interactive toolkit{,} ", year = "2022", url = "https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431", note = "[Online; accessed 28-March-2023]" }
When using the LaTeX package url (\usepackage{url}
somewhere in the preamble) which tends to give much more nicely formatted web addresses, the following may be preferred:
@misc{ wiki:xxx, author = "International cyber law: interactive toolkit", title = "Scenario 12: Cyber operations against computer data --- International cyber law: interactive toolkit{,} ", year = "2022", url = "\url{https://cyberlaw.ccdcoe.org/w/index.php?title=Scenario_12:_Cyber_operations_against_computer_data&oldid=3431}", note = "[Online; accessed 28-March-2023]" }