Alma Mater Studiorum - Forlì

Home page
Le collezioni
La scuola
Il progetto
I collaboratori
Gli sponsor
Il laboratorio
Regole e normative
Per contattarci

ho dimenticato la password
mi voglio iscrivere

ceci n'est pas une pomme
previous computer sabotage - collezione «Diritto ed Informatica: Diritto Internet» - Annalisa Storto next
Cerca   nella collezione  

Diritto ed Informatica: Diritto Internet

computer sabotage clicca per ingrandire
Context In 1989 the Council of Europe´s Committee of Ministers adopted a recommendation on the topic of computer crime. […] Eight specific forms of conduct were represented in this list: computer fraud and forgery, damage to data or programs, computer sabotage, unauthorised access (again involving the overcoming of security measures), the unauthorised interception of data transmissions (whether internal to a system or otherwise), the unauthorised reproduction of a computer program or of a topography.
Context source (B)reed8
Subject field Internet Law
Comprehensive concept hacking (En)
Partitive concept back door, Trojan horse, virus (En), worm (En)
Related concept unauthorized access
it sabotaggio informatico
Reliability code 3

SSLMIT - Scuola Superiore di Lingue Moderne per Interpreti e Traduttori  &  MIT - Management Innovative Tools S.p.A. - Powered by : Powered by DynaMIT