APA 6th Edition Zhao, H. i Kwiat, K. (2015). Guest Editorial. Journal of computing and information technology, 23 (4), III-IV. Preuzeto s https://hrcak.srce.hr/149734
MLA 8th Edition Zhao, Hong i Kevin Kwiat. "Guest Editorial." Journal of computing and information technology, vol. 23, br. 4, 2015, str. III-IV. https://hrcak.srce.hr/149734. Citirano 11.04.2021.
Chicago 17th Edition Zhao, Hong i Kevin Kwiat. "Guest Editorial." Journal of computing and information technology 23, br. 4 (2015): III-IV. https://hrcak.srce.hr/149734
Harvard Zhao, H., i Kwiat, K. (2015). 'Guest Editorial', Journal of computing and information technology, 23(4), str. III-IV. Preuzeto s: https://hrcak.srce.hr/149734 (Datum pristupa: 11.04.2021.)
Vancouver Zhao H, Kwiat K. Guest Editorial. Journal of computing and information technology [Internet]. 2015 [pristupljeno 11.04.2021.];23(4):III-IV. Dostupno na: https://hrcak.srce.hr/149734
IEEE H. Zhao i K. Kwiat, "Guest Editorial", Journal of computing and information technology, vol.23, br. 4, str. III-IV, 2015. [Online]. Dostupno na: https://hrcak.srce.hr/149734. [Citirano: 11.04.2021.]
Sažetak Network security is a continuing endeavor as exhibited by this special issue on the subject. Although the problem of securing networks emerged almost simultaneously with their development, attaining a fixed set of complete solutions remains evasive. In the history of the development of computers and networking, solutions to challenging problems have become touchstones, and from among them we can draw a parallel to the current state of network development.