FN78

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 11:09, 26 February 2009 by Mdpeters (talk | contribs) (New page: Colo RS § 18-5.5-102. S Turkle, The Second Self (Simon & Schuster, New York 1984). BloomBecker, Computer Crime: The Corporate Counsel's View, 1 Computer Crime Dig 7 (March 1983); Comput...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Colo RS § 18-5.5-102.

S Turkle, The Second Self (Simon & Schuster, New York 1984).

BloomBecker, Computer Crime: The Corporate Counsel's View, 1 Computer Crime Dig 7 (March 1983); Computer Crime, Computer Security, Computer Ethics (The first annual statistical report), J BloomBecker, ed., National Center for Computer Crime Data (Los Angels 1985); BloomBecker, Balancing the Scales: Computer Crime Legislation pp IS80-300-101 to 118, Datapro reports on Information Security (Delran NJ 1985).

J BloomBecker, The Investigation of Computer Crime, U.S. Department of Justice (Washington D.C. 1977); T Schabeck, Computer Crime Investigation Manual (Territorial Imperative, Madison WI 1978).

See, for example, Cal Pen C § 1417.15.