<--- Back to Details
First PageDocument Content
Information technology audit / Criminal law / Computer crimes / Cyberspace / Legal aspects of computing / Abuse / Fraud / Computer fraud / Computer Fraud and Abuse Act / Computer law / Law / Crimes
Date: 2014-07-16 02:47:23
Information technology audit
Criminal law
Computer crimes
Cyberspace
Legal aspects of computing
Abuse
Fraud
Computer fraud
Computer Fraud and Abuse Act
Computer law
Law
Crimes

Add to Reading List

Source URL: www.lgt.polyu.edu.hk

Download Document from Source Website

File Size: 118,12 KB

Share Document on Facebook

Similar Documents

On Proebsting’s Law Kevin Scott Department of Computer Science Technical Report CSUniversity of Virginia Charlottesville, VA 22904

DocID: 1vloa - View Document

Legal knowledge based systems JURIX 93 Intelligent Tools for Drafting Legislation, Computer - Supported Comparison of Law The Foundation for Legal Knowledge Systems

DocID: 1uIL3 - View Document

ATTENTION: Starting January 1, 2011 New Jersey State law states that the following can no longer be put out with your garbage: PERSONAL COMPUTERS (LAPTOP & DESKTOP)• COMPUTER MONITORS • TELEVISIONS

DocID: 1uHkR - View Document

Legal knowledge based systems JURIX 93 Intelligent Tools for Drafting Legislation, Computer - Supported Comparison of Law The Foundation for Legal Knowledge Systems

DocID: 1uwol - View Document

Lecture 2.1 Amdahl’s Law ENInstructor: Randal Burns 31 January 2018 Department of Computer Science, Johns Hopkins University

DocID: 1uri2 - View Document