What people are saying - Write a review
We haven't found any reviews in the usual places.
Classifying the Crime
Classes of Computer Abuse
Computer Abuse Methods and Detection
15 other sections not shown
Other editions - View all
acts application audit auditor backup cess computer crime computer crime laws computer network computer operating computer programs computer security computer services computer storage computer system copies court criminal damage data base data center data communications data entry data ﬁles data processing defendant deﬁned deﬁnition designed detection developed device difﬁcult disk diskette documentation electronic employee equipment evidence executed facilities federal felony ﬁeld ﬁnancial ﬁne ﬁrst fraud functions grams identiﬁed input instructions investigators language larceny logic bomb magnetic tape mainframe computers methods modiﬁed offense ofﬁce on-line on-line systems operating system organizations output password payroll perform perpetrators person personal computer printouts procedures production prosecutor puter records reports signiﬁcant speciﬁc statute storage stored sufﬁcient suspect technical telephone terminal theft time-sharing tion trade secrets transaction Trojan horse U.S.C. Sect unauthorized violations vulnerability