FN44: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(New page: SC C § 16-16-20(1); BloomBecker, Computer Crime Laws § 2:41.)
 
No edit summary
 
Line 1: Line 1:
SC C § 16-16-20(1); BloomBecker, Computer Crime Laws § 2:41.
SC C § 16-16-20(1); BloomBecker, Computer Crime Laws § 2:41.
Mo RS § 569.097 2(3).
Association for Systems Management, 24587 Bagley Rd., Cleveland, OH 44138 (216) 243-6900.
Illinois v. Gates, 462 U.S. 213, 103 S. Ct. 2317, 76 L. Ed. 2d 527 (1983), reh'g denied, 463 U.S. 1237, 104 S. Ct. 33, 77 L. Ed. 2d 1453 (1983).
BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp 3–6 (Sept 1982); BloomBecker, Weg Revisited, 1 Computer Crime Dig 7 (Oct 1982).

Latest revision as of 03:00, 5 March 2009

SC C § 16-16-20(1); BloomBecker, Computer Crime Laws § 2:41.

Mo RS § 569.097 2(3).

Association for Systems Management, 24587 Bagley Rd., Cleveland, OH 44138 (216) 243-6900.

Illinois v. Gates, 462 U.S. 213, 103 S. Ct. 2317, 76 L. Ed. 2d 527 (1983), reh'g denied, 463 U.S. 1237, 104 S. Ct. 33, 77 L. Ed. 2d 1453 (1983).

BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp 3–6 (Sept 1982); BloomBecker, Weg Revisited, 1 Computer Crime Dig 7 (Oct 1982).