FN87

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

The variety of physical attacks has been summarized in BloomBecker, Playpens and Cookie Jars: An Invitation to Computer Crime, Computerworld p 13 (May 1981).

BloomBecker, Computer Crime Update: The View As We Exit 1984, 7 Western New England LR 627 (Spring 1985).

NY Crim Proc L § 250.30; BloomBecker, Computer Crime Laws § 16:6.

As to trial transcript, generally, see 4 Am. Jur. 2d, Appeal and Error §§ 404–406.