25.4 Summary


In this chapter we tried to give you a brief overview of how the law of computer crime is likely to affect you in your operation of a Unix system. Because this is a fast-moving field, we have shied away from detailed discussions of laws and specific techniques: instead, we have stressed principles and ground rules that have withstood the test of time ”or at least the test of the past 10 years .

With any luck, you will never need to use any of the material in this chapter. If you do, we suggest that you seek legal assistance. Reading a book is no substitute for speaking to a human being.



Practical UNIX and Internet Security
Practical Unix & Internet Security, 3rd Edition
ISBN: 0596003234
EAN: 2147483647
Year: 2003
Pages: 265

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net