As stated in the course outline, plagiarism is a serious offense. Please document any/all submissions submitted, using the following general format:Books:
Garfinkel, Simson and Spafford, Gene. (June 1991). Practical UNIX Security. O'Reilly and Associates.
Journals:
Tristram, Clair. (May 1995). Ten Things You Need to Know About Firewalls. Open Computing, pp. 61-63.
Internet Sites:
Bellovin, Steven M. (February 1994). Firewall-Friendly FTP. RFC 1579.
Cheswick, William. The Design of a Secure Internet Gateway. USENIX Proceedings. Available for FTP from research.att.com:/dist/secure_internet_gateway.ps or use http address.
Proceedings:
Ranum, Marcus. (November 1992). Thinking About Firewalls. Proceedings of First International Conference on Systems and Network Security and Management, pages 1-5.
The simplest (and cleanest) method is to put your sources in alphabetical order (by author's name, etc.), number each source in a Reference page and then merely cite the number in the body of the text [i.e. (1)].
- Example:
In former times, people built brick walls between buildings and wood houses to prevent a fire, which might have broken out, from spreading from one building to the next. These brick walls were, therefore, called firewalls. (1)