Check nearby libraries
Buy this book
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
Showing 1 featured edition. View all 1 editions?
Edition | Availability |
---|---|
1 |
aaaa
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Trespassing in government cyberspace (18 u.s.c. 1030(a)(3))
Obtaining information by unauthorized computer access (18 U.S.C. 1030(a)(2))
Causing computer damage (18 U.S.C. 1030(a)(5))
Computer fraud (18 U.S.C. 1030(a)(4))
Extortionate threats (18 U.S.C. 1030(a)(7))
Trafficking in computer access (18 U.S.C. 1030(a)(6))
Computer espionage (18 U.S.C. 1030(a)(1)).
Edition Notes
Includes bibliographical references and index.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?August 21, 2020 | Edited by ImportBot | import existing book |
December 4, 2010 | Edited by Open Library Bot | Added subjects from MARC records. |
December 10, 2009 | Created by WorkBot | add works page |