FN84

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 12:15, 28 February 2009 by Mdpeters (talk | contribs) (New page: People by Vacco v. Lipsitz, 174 Misc. 2d 571, 663 N.Y.S.2d 468 (Sup. Ct. 1997). D Parker, Crime by Computer p 46 (Scribner's Sons, New York 1976); BloomBecker, Robin Hood, 1 Computer Crim...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

People by Vacco v. Lipsitz, 174 Misc. 2d 571, 663 N.Y.S.2d 468 (Sup. Ct. 1997).

D Parker, Crime by Computer p 46 (Scribner's Sons, New York 1976); BloomBecker, Robin Hood, 1 Computer Crime Dig 3 (June 1983).

BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp 3–6 (Sept 1982); BloomBecker, Weg Revisited, 1 Computer Crime Dig 7 (Oct 1982).

See, for example, BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp 3–6 (Sept 1982) and BloomBecker, Weg Revisited, 1 Computer Crime Dig 7 (Oct 1982).