APA-Zitierstil (7. Ausg.)

(2008). Hardware-based computer security techniques to defeat hackers: From biometrics to quantum cryptography. Wiley.

Chicago-Zitierstil (17. Ausg.)

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography. Hoboken, N.J: Wiley, 2008.

MLA-Zitierstil (9. Ausg.)

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography. Wiley, 2008.

Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.