Computer Security and the Law
View Paper
ESSAY DETAILS
Words: 2096
Pages: 8
(approximately 235 words/page)
Pages: 8
(approximately 235 words/page)
Essay Database > Literature > English
showed first 75 words of 2096 total
showed last 75 words of 2096 total
uart R. Wolk and William J. Luddy Jr., "Legal Aspects of Computer Use," Prentice Hall, 1986, pg. 129. [2] National Computer Security Center, "Glossary of Computer Security Terms," 21 October 1988. [3] Thomas R. Mylott III, "Computer Law for the Computer Professional," Prentice Hall, 1984, pg. 131. [4] Gasser, Morrie, "Building a Secure Computer System," Van Nostrand, 1988. [5] Department of Defense, "Department of Defense Trusted Computer System Evaluation Criteria," December 1985. [6] United States Department of Justice, "Computer Crime, Criminal Justice Resource Manual," 1979. [7] Wolk and Luddy, pg. 117.
uart R. Wolk and William J. Luddy Jr., "Legal Aspects of Computer Use," Prentice Hall, 1986, pg. 129. [2] National Computer Security Center, "Glossary of Computer Security Terms," 21 October 1988. [3] Thomas R. Mylott III, "Computer Law for the Computer Professional," Prentice Hall, 1984, pg. 131. [4] Gasser, Morrie, "Building a Secure Computer System," Van Nostrand, 1988. [5] Department of Defense, "Department of Defense Trusted Computer System Evaluation Criteria," December 1985. [6] United States Department of Justice, "Computer Crime, Criminal Justice Resource Manual," 1979. [7] Wolk and Luddy, pg. 117.