FN84

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

People by Vacco v. Lipsitz, 174 Misc. 2d 571, 663 N.Y.S.2d 468 (Sup. Ct. 1997).

D Parker, Crime by Computer p 46 (Scribner's Sons, New York 1976); BloomBecker, Robin Hood, 1 Computer Crime Dig 3 (June 1983).

BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp 3–6 (Sept 1982); BloomBecker, Weg Revisited, 1 Computer Crime Dig 7 (Oct 1982).

See, for example, BloomBecker, People v. Weg, Theft of Services Didn't Serve Us, Computer Crime Digest, Prepublication Issue pp 3–6 (Sept 1982) and BloomBecker, Weg Revisited, 1 Computer Crime Dig 7 (Oct 1982).