Formatted Citation

WorldCat lets people access the collections of
    libraries worldwide [WorldCat.org]

Remember, you are responsible for the completeness and formatting of citations you include in papers, manuscripts, and course assignments.

You should always double-check the final result.

APA

Souppaya, M., Kent, K., & National Institute of Standards and Technology (U.S.). (2006). Guide to computer security log management: Recommendations of the National Institute of Standards and Technology. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology.

MLA

Souppaya, Murugiah, and Karen Kent. Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006. Internet resource.

CHICAGO

Souppaya, Murugiah, and Karen Kent. 2006. Guide to computer security log management recommendations of the National Institute of Standards and Technology. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology. http://purl.access.gpo.gov/GPO/LPS69969.

HARVARD

SOUPPAYA, M., & KENT, K. (2006). Guide to computer security log management recommendations of the National Institute of Standards and Technology. Gaithersburg, MD, U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology. http://purl.access.gpo.gov/GPO/LPS69969.

TURABIAN

Souppaya, Murugiah, and Karen Kent. Guide to Computer Security Log Management Recommendations of the National Institute of Standards and Technology. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006. <http://purl.access.gpo.gov/GPO/LPS69969>.