FN87

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 12:21, 28 February 2009 by Mdpeters (talk | contribs) (New page: The variety of physical attacks has been summarized in BloomBecker, Playpens and Cookie Jars: An Invitation to Computer Crime, Computerworld p 13 (May 1981). BloomBecker, Computer Crime U...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

The variety of physical attacks has been summarized in BloomBecker, Playpens and Cookie Jars: An Invitation to Computer Crime, Computerworld p 13 (May 1981).

BloomBecker, Computer Crime Update: The View As We Exit 1984, 7 Western New England LR 627 (Spring 1985).

NY Crim Proc L § 250.30; BloomBecker, Computer Crime Laws § 16:6.

As to trial transcript, generally, see 4 Am. Jur. 2d, Appeal and Error §§ 404–406.