The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 7: | Line 7: | ||
[[File:Parker.png|thumb]] |
[[File:Parker.png|thumb]] |
||
β | This guide provides a discussion of the nature, history, and classification of [[computer crime]]. It highlights [[white collar crime]] and an enumeration of [[computer abuse]] methods and [[detection]] together with an analysis by experts and on suspects. An overview of [[computer]] and [[communications technology]] is presented, and the current [[computer crime]] environment is discussed with emphasis on [[vulnerability]] and [[prevention]] |
+ | This guide provides a discussion of the nature, history, and classification of [[computer crime]]. It highlights [[white collar crime]] and an enumeration of [[computer abuse]] methods and [[detection]] together with an analysis by experts and on suspects. An overview of [[computer]] and [[communications technology]] is presented, and the current [[computer crime]] environment is discussed with emphasis on [[vulnerability]] and [[prevention.]] |
β | [[Computer crime]] [[prosecution]] is outlined, and selected Federal and State laws explained. A glossary of technical terms and appendixes with selected State and Federal [[computer crime]] [[statute]]s, citations of State [[computer crime]] [[statute]]s, selected news media cases, [[data processing]] occupations, [[audit]] |
+ | [[Computer crime]] [[prosecution]] is outlined, and selected Federal and State laws explained. A glossary of technical terms and appendixes with selected State and Federal [[computer crime]] [[statute]]s, citations of State [[computer crime]] [[statute]]s, selected news media cases, [[data processing]] occupations, [[audit tool]]s, and sources of [[expert witness]]es are included. |
[[Category:Publication]] |
[[Category:Publication]] |
||
[[Category:Computer crime]] |
[[Category:Computer crime]] |