<--- Back to Details
First PageDocument Content
Criminal law / Government / National Information Infrastructure Protection Act / Protected computer / Computer Fraud and Abuse Act / Title 18 of the United States Code / United States Code / Computer law / Law / Information technology audit
Date: 2012-02-21 10:18:39
Criminal law
Government
National Information Infrastructure Protection Act
Protected computer
Computer Fraud and Abuse Act
Title 18 of the United States Code
United States Code
Computer law
Law
Information technology audit

Computer Fraud & Abuse Act

Add to Reading List

Source URL: energy.gov

Download Document from Source Website

File Size: 25,24 KB

Share Document on Facebook

Similar Documents

On Proebsting’s Law Kevin Scott Department of Computer Science Technical Report CSUniversity of Virginia Charlottesville, VA 22904

DocID: 1vloa - View Document

Legal knowledge based systems JURIX 93 Intelligent Tools for Drafting Legislation, Computer - Supported Comparison of Law The Foundation for Legal Knowledge Systems

DocID: 1uIL3 - View Document

ATTENTION: Starting January 1, 2011 New Jersey State law states that the following can no longer be put out with your garbage: PERSONAL COMPUTERS (LAPTOP & DESKTOP)• COMPUTER MONITORS • TELEVISIONS

DocID: 1uHkR - View Document

Legal knowledge based systems JURIX 93 Intelligent Tools for Drafting Legislation, Computer - Supported Comparison of Law The Foundation for Legal Knowledge Systems

DocID: 1uwol - View Document

Lecture 2.1 Amdahl’s Law ENInstructor: Randal Burns 31 January 2018 Department of Computer Science, Johns Hopkins University

DocID: 1uri2 - View Document