Research Provider you can trust
TODAY and TOMORROW!
Service Features
  • 275 words per page
  • Font: 12 point Courier New
  • Double line spacing
  • Free unlimited paper revisions
  • Free bibliography
  • Any citation style
  • No delivery charges
  • SMS alert on paper done
  • No plagiarism
  • Direct paper download
  • Original and creative work
  • Researched any subject
  • 24/7 customer support

crime

Title: crime
Category: /Literature/English
Details: Words: 8407 | Pages: 31 (approximately 235 words/page)
crime
computer underground By: steve schmidt E-mail: testcard2@excite.com The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of …showed first 75 words of 8407 total…
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
…showed last 75 words of 8407 total…-126. Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution. New York: Dell Publishing. Message Logs from a variety of computer underground bulletin board systems, 1988-1989. NBC-TV. 1988. Hour Magazine. November 2, 1988. Bill Lan! dreth, 1985, Outside the Inner Circle. Microsoft publishing Parker, Donn B. 1983. Fighting Computer Crime. New York: Charles Scribner's Sons. Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box ." Esquire October, pp. 116-125. Small, David. 1988. Personal communication to Gordon Meyer. WGN-Radio. 1988. Ed Schwartz Show. September 27, 1988. ------------------------------------------------------------------------ **Bibliography**

Need a custom written paper?