APA (7th ed.) Citation

(2008). Hardware-based computer security techniques to defeat hackers: From biometrics to quantum cryptography. Wiley.

Chicago Style (17th ed.) Citation

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography. Hoboken, N.J: Wiley, 2008.

MLA (9th ed.) Citation

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography. Wiley, 2008.

Warning: These citations may not always be 100% accurate.