Annotated bibliography

   The point of this assignment is for you to arise representing your investigation in ways that aid you to see patterns in it. The most basic way to do this is an annotated bibliography: a schedule of commencements (moderate underneath),  cited in APA format, that includes an elucidation summarizing the citation.  For this assignment,  Your schedule should be nice alphabetically by the developed spectry of the highest agent. ====================== Template: Each beginning should be in the format underneath; use that as a template and quote for each commencement. Write 1-2 sentences for each item in the elucidation. Last, Highest Initial. (Year) Title of period. Title of Journal, compass #, pages. doi: Summary of Argument: Methodology of Study: Evaluation of Conclusion: ==================== Example: Nelson, D. (2002) Pursuing Seclusion in Cold War America. New York: Columbia University Press. Summary: Nelson argues that the discussions of seclusion that emerged in twain American poetry and principle throughout the 1950s and 1960s can be traced to an care encircling the germinative intrusions of the general pawn propound in characterless of the perceived Soviet intimidation. At the selfselfsame duration that seclusion was most intimidationened by governmental intrusion, it was being asserted as a new juridical exact, a interrogativeness that manifests itself equal in Supreme Court decisions and the confessional poetry of agents enjoy Robert Lowell, Sylvia Plath, and Adrienne Rich. Method: Interpretive and unromantic, traces contemporaneous developments in attainment and law. Evaluation: Nelson is nonetheless cogent to do dwarf over than correlate these two phenomena, which largely answer coincidental rather than intrinsically linked. ======================= List of references:  1. Os, V. R. (2016). SOC-CMM: Designing and evaluating a utensil for configuration of power ripeness in pawn operations centers. Master Thesis, Information Pawn Program, 1-75. Retrieved from https://www.jbisa.nl/download/?id=17715570&download=1 2. Ernst & Young, Pawn Operations Centers resisting Cybercrime, October 2013  3. Jacobs, P. et al., “Classification of Pawn Operation Centers”, Proceedings of the 2013 Information Pawn for South Africa Conference, 2013 4. Schinagl, S. et al., “A framework for Designing a Pawn Operations Centre (SOC)”, Proceedings of the 2015 Hawaii Intergeneral Conference on System Sciences (HICSS), 2015, pp. 2253-2262  5. Carcary, M., “Design Science Research: The Case of the IT Power Ripeness Framework (IT CMF)”, The Electronic Journal of Business Investigation Methods, Vol. 9, No. 2, 2011, pp. 109-118  6. RSA, “Building an Intelligence-Driven Pawn Operations Center”, RSA Technology Brief, 2014. Retrieved on 01-01-2015 from: https://www.emc.com/collateral/technical-documentation/h11533-intelligence- driven-security-ops-center.pdf  7. Nathans, D., “Designing and Building a Pawn Operations Center”, Syngress publications, 2015.  8. Rasche, G., “Guidelines for Planning an Integrated Pawn Operations Center”, EPRI, 2013. Retrieved on 01-01-2015 from: http://www.epri.com/abstracts/Pages/ProductAbstract.aspx?ProductId=000000003002000374  9. DTS Solution, “Next Generation Pawn Operations Center”, DTS Solution, 2014. Retrieved on 01-01-2015 from: http://www.dts-solution.com/wp-content/uploads/2014/04/Security-Operations-Center-v2.pdf  10. Özbay, E., “Building a Pawn Operations Center”, IBM Pawn Services, 2015. Retrieved on 01-01-2015 from: ftp://public.dhe.ibm.com/software/pdf/tr/security/security_intelligence/4-SOC_Consulting-v5.ppt  11. General Cyber Pawn Center, “CSIRT Ripeness Kit, A slow regulate towards enhancing CSIRT ripeness”, GCCS2015, 2015. Retrieved on 28-04-2016 from: https://check.ncsc.nl/static/CSIRT_MK_guide.pdf 12. Enisa, “CSIRT capabilities, how to assess ripeness? Guidelines for general and governmental CSIRTs”, Enisa, December 2015. Retrieved on 28-04-2016 from: https://www.enisa.europa.eu/publications/csirt- capabilities/at_download/fullReport  13. Raber, D. et al., “Using Quantitative Analyses to Construct a Power Ripeness Model for Business Intelligence”, Proceedings of the 2012 Hawaii Intergeneral Conference on System Sciences, 2012, pp. 4219-4227 14. Miguel, J.P., “A Review of Software Quality Models for the Evaluation of Software Products”, Intergeneral Journal of Software Engineering & Applications, Vol.5, No.6, November 2014, pp. 31-53 15. CREST, “The CREST Cyber Pawn Incident Response Ripeness Assessment Tool”, CREST, 2014. Retrieved on 28-04-2016 from: https://www.crest-approved.org/wp-content/uploads/2014/10/CSIR-Maturity- assessment-tool_Info1.pdf