... source: aquot;Table 1. Summary of CFAA Provisions, aquot; in Prosecuting Computer Crimes, U.S. Department of Justice, Computer Crime and Intellectual Property Section, Criminal Division, February 2007, http://www .cybercrime.gov/ccmanual/ ccmanual.pdf (accessed ... Spam can also be used to access computers and servers without authorization and transmit viruses or forward spam. Spam senders often sell open proxy information, credit card information, and e-mail lists illegally.
|Title||:||Crime Prisons and Jails|
|Author||:||Melissa J. Doak|
|Publisher||:||Information Plus - 2009-10-02|