Protected computer

Results: 695



#Item
591Protected computer / Law / Computer law / Computer network security / Cybercrime

1997 Federal Sentencing Guidelines Manual

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:22:52
592Protected computer / Law / Computer law / Computer network security / Cybercrime

APPENDIX A GUIDELINES MANUAL November 1, 2012

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:23:14
593Protected computer / Law / National Information Infrastructure Protection Act / Computing / Computer law / Computer network security / Cybercrime

§ 1030 TITLE 18—CRIMES AND CRIMINAL PROCEDURE 1994—Subsec. (a)(3). Pub. L. 103–322, § [removed]A), and Pub. L. 103–414, § 206(a)(1), amended par. (3) identically,

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2013-08-12 16:44:46
594Protected computer / Law / Computer law / Computer network security / Cybercrime

2010 Federal Sentencing Guidelines Manual

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:22:56
595Protected computer / Law / Computer law / Computer network security / Cybercrime

1992 Federal Sentencing Guidelines Manual - Appendix A - Statutory Index

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:23:24
596Protected computer / Law / Computer law / Computer network security / Cybercrime

2010 Federal Sentencing Guidelines Manual - Appendix A - Amendments to the Guidelines Manual

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:23:06
597Protected computer / Law / Computer law / Computer network security / Cybercrime

1991 Federal Sentencing Guidelines Manual - Appendix A - Statutory Index

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:23:44
598Sex laws / United States Federal Sentencing Guidelines / United States federal law / Pornography / Protected computer / Human sexuality / Ages of consent in North America / Child pornography laws in the United States / Computer law / Law / Criminal law

Report to Congress: Federal Child Pornography Offenses - Appendix B

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:19:10
599Ethics / Crimes / United States Federal Sentencing Guidelines / United States federal law / Economic Espionage Act / Protected computer / Trade secret / Attendant circumstance / First Amendment to the United States Constitution / Law / Computer law / Criminal law

National Association of Criminal Defense Lawyers Steven D. Benjamin President President Steven D. Benjamin Richmond, VA

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:20:54
600Computer network security / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Related-key attack / Initialization vector / Wi-Fi Protected Access / Transmission Control Protocol / Cryptography / Cryptographic protocols / IEEE 802.11

Breaking 104 bit WEP in less than 60 seconds Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin Technische Universit¨ at Darmstadt, Fachbereich Informatik

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2007-04-03 09:43:48
UPDATE