C.3 Endnotes


C.3 Endnotes

1. http://www. usdoj .gov/criminal/ cybercrime /1030_new.html

2. http://www.tscm.com/USC18_90.html

3. http://hippo. findlaw .com/hipaa.html#Anchor2

4. http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=106_cong_bills&docid=f:s900enr.txt.pdf

5. http://www.ftc.gov/os/statutes/itada/itadact.htm

6. http://www.usdoj.gov/criminal/cybercrime/1030_anal.html

7. http://www.iwar.org.uk/cip/resources/eo/eo13010.pdf

8. http://www.dhs.gov/interweb/assetlibrary/hr_5005_enr.pdf

9. http://news.findlaw.com/hdocs/docs/gwbush/sarbanesoxley072302.pdf

10. http://floridalawfirm.com/privacy.html

11. http://www.askcalea.net/calea.html

12. http://www.eff.org/Privacy/Surveillance/Terrorism_militias/hr3162.php




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net