Cite This Page
Bibliographic details for 8 steps to a working Linux Intrusion Detection System (SHADOW)
- Page name: 8 steps to a working Linux Intrusion Detection System (SHADOW)
- Author: Edgar BV Wiki contributors
- Publisher: Edgar BV Wiki, .
- Date of last revision: 2 March 2007 12:48 UTC
- Date retrieved: 17 May 2024 03:32 UTC
- Permanent URL: http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50
- Page Version ID: 50
Citation styles for 8 steps to a working Linux Intrusion Detection System (SHADOW)
APA style
8 steps to a working Linux Intrusion Detection System (SHADOW). (2007, March 2). Edgar BV Wiki, . Retrieved 03:32, May 17, 2024 from http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50.
MLA style
"8 steps to a working Linux Intrusion Detection System (SHADOW)." Edgar BV Wiki, . 2 Mar 2007, 12:48 UTC. 17 May 2024, 03:32 <http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50>.
MHRA style
Edgar BV Wiki contributors, '8 steps to a working Linux Intrusion Detection System (SHADOW)', Edgar BV Wiki, , 2 March 2007, 12:48 UTC, <http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50> [accessed 17 May 2024]
Chicago style
Edgar BV Wiki contributors, "8 steps to a working Linux Intrusion Detection System (SHADOW)," Edgar BV Wiki, , http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50 (accessed May 17, 2024).
CBE/CSE style
Edgar BV Wiki contributors. 8 steps to a working Linux Intrusion Detection System (SHADOW) [Internet]. Edgar BV Wiki, ; 2007 Mar 2, 12:48 UTC [cited 2024 May 17]. Available from: http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50.
Bluebook style
8 steps to a working Linux Intrusion Detection System (SHADOW), http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50 (last visited May 17, 2024).
BibTeX entry
@misc{ wiki:xxx, author = "Edgar BV Wiki", title = "8 steps to a working Linux Intrusion Detection System (SHADOW) --- Edgar BV Wiki{,} ", year = "2007", url = "http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50", note = "[Online; accessed 17-May-2024]" }
When using the LaTeX package url (\usepackage{url}
somewhere in the preamble) which tends to give much more nicely formatted web addresses, the following may be preferred:
@misc{ wiki:xxx, author = "Edgar BV Wiki", title = "8 steps to a working Linux Intrusion Detection System (SHADOW) --- Edgar BV Wiki{,} ", year = "2007", url = "\url{http://wiki.edgarbv.com/index.php?title=8_steps_to_a_working_Linux_Intrusion_Detection_System_(SHADOW)&oldid=50}", note = "[Online; accessed 17-May-2024]" }