Menkus, 1991 - Google Patents
Hacker pleads guilty to Unix theftMenkus, 1991
- Document ID
- 4130609933183329595
- Author
- Menkus B
- Publication year
- Publication venue
- Computer Fraud & Security Bulletin
External Links
- 241000220317 Rosa 0 abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2025434A1 (en) | Method for protecting against the unauthorized use of software in a computer network environment | |
Inbau | Law and police practice: restrictions in the law of interrogation and confessions | |
DE10051461A1 (en) | Method and system for identifying a user | |
JPH06507277A (en) | Personal authentication method and device | |
Turn et al. | Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions | |
Menkus | Hacker pleads guilty to Unix theft | |
Rees | Melbourne hackers on trial | |
Collier et al. | A forensic methodology for countering computer crime | |
EP1362272B1 (en) | Method and arrangement for a rights ticket system for increasing security of access control to computer resources | |
JPH03154137A (en) | Security system for data | |
JPS63143667A (en) | Password protective device | |
Rees | Hacker pleads guilty to Unix theft | |
Klopp et al. | IT challenge to US constitution | |
Romanowski et al. | A Biometric Security Acceptability and Ease-of-Use Study on a Palm Vein Scanner | |
Rosenberg | Withrow v. Williams: Reconstitutionalizing Miranda | |
Buresh | Privacy, Biometrics, and the Individual | |
Jovasevic | Computer Crimes in Republic of Serbia | |
Jovašević | Computer crimes in Republic of Serbia | |
Collier et al. | Forensic science against computer crime in the United Kingdom | |
Tóth et al. | The common law approaches to identity theft: Implications for Hungarian law reform | |
JP3086892U (en) | Device for preventing tampering of hardware equipment and software settings | |
JPH06259381A (en) | Password matching processor | |
Betts | Hacker sentenced for accessing U. S. agency computers. | |
Hovey | Contracts-Restraint of Trade or Competition in Trade-Construction of Restrictive Covenants | |
PROSECUTED | Technology Watch-Personal Authentication Devices |