Citations
ABNT
SATER, W. F. Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974. Hispanic American Historical Review, [s. l.], v. 89, n. 3, p. 567–569, 2009. DOI 10.1215/00182168-2009-045. Disponível em: https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=asx&AN=43828717&authtype=uid&user=rmabrowserextension&password=Br0wserExtension789! Acesso em: 30 mar. 2023.
AMA 11th Edition
SATER WF. Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974. Hispanic American Historical Review. 2009;89(3):567-569. doi:10.1215/00182168-2009-045
APA 7th Edition
SATER, W. F. (2009). Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974. Hispanic American Historical Review, 89(3), 567–569. https://doi.org/10.1215/00182168-2009-045
Chicago 17th Edition
SATER, WILLIAM F. 2009. “Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974.” Hispanic American Historical Review 89 (3): 567–69. doi:10.1215/00182168-2009-045.
Harvard
SATER, W.F. (2009) ‘Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974’, Hispanic American Historical Review, 89(3), pp. 567–569. doi:10.1215/00182168-2009-045.
Harvard: Australian
SATER, WF 2009, ‘Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974’, Hispanic American Historical Review, vol. 89, no. 3, pp. 567–569, viewed 30 March 2023, .
MLA 9th Edition
SATER, WILLIAM F. “Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974.” Hispanic American Historical Review, vol. 89, no. 3, Aug. 2009, pp. 567–69. EBSCOhost, https://doi.org/10.1215/00182168-2009-045.
Chicago 17th Edition
SATER, WILLIAM F. “Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974.” Hispanic American Historical Review 89, no. 3 (August 2009): 567–69. doi:10.1215/00182168-2009-045.
Vancouver/ICMJE
SATER WF. Hostile Intent: U.S. Covert Operations in Chile, 1964 - 1974. Hispanic American Historical Review [Internet]. 2009 Aug [cited 2023 Mar 30];89(3):567–9. Available from: https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=asx&AN=43828717&authtype=uid&user=rmabrowserextension&password=Br0wserExtension789!