Week 8 post 2

Secure Virtualization Technology, Farzad Sabahi

To come later

I use ProQuest for this one and used network security as the keyword for this one

Article

Right now I am still debating whether or not it is an academic paper as one of the parts weren’t meet but by the looks of it they put that information at the end instead of beginning it also because of the length of the paper it only a couple of pages meaning it’s questionable to me.

It has 14 references in this paper.

N/A

Right now I’m still debating whether or not to use this as an article to use for assignment 2 as the length and other parts are not meet but personally, I haven’t reviewed and article before so this will be a first time.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s