Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             54 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Advanced computer applications for investment managers 1991
7 1 p. 34-
1 p.
artikel
2 An analysis of the information technology standardization process 1991
7 1 p. 47-
1 p.
artikel
3 Application of anti-piracy provisions of the copyright act 1968 Lewis, David P.
1991
7 1 p. 35-36
2 p.
artikel
4 Beating the system - hackers, phreakers and electronic spies 1991
7 1 p. 48-
1 p.
artikel
5 Benefits and risks of knowledge-based systems. Report of t the working party council for science and society 1991
7 1 p. 47-
1 p.
artikel
6 British broadcasting corp v British sky broadcasting ltd (formerly British Satellite broadcasting ltd), chancery division, the times, 22 January 1991 1991
7 1 p. 38-
1 p.
artikel
7 Business telecommunications 1991
7 1 p. 6-
1 p.
artikel
8 Canadian criminal code applied to software pirate 1991
7 1 p. 43-
1 p.
artikel
9 Compaq attack dell computer's advertising campaign 1991
7 1 p. 39-
1 p.
artikel
10 Computer ethics 1991
7 1 p. 17-
1 p.
artikel
11 Computers and the Law 1991
7 1 p. 36-
1 p.
artikel
12 Computer software protection/liability/law/forms 1991
7 1 p. 47-48
2 p.
artikel
13 Computing services association “buy it in” survey 1991
7 1 p. 40-
1 p.
artikel
14 Conferences 1991
7 1 p. 46-
1 p.
artikel
15 Council of Europe 1991
7 1 p. 44-
1 p.
artikel
16 Data matching - new Australian developments 1991
7 1 p. 15-17
3 p.
artikel
17 Data protection news 1991
7 1 p. 40-
1 p.
artikel
18 Editorial 1991
7 1 p. 1-
1 p.
artikel
19 Editorial board 1991
7 1 p. IFC-
1 p.
artikel
20 Electronic freedom foundation sponsor conference on civil liberties and the electronic frontier 1991
7 1 p. 43-
1 p.
artikel
21 Electronics, computers and telephone switching 1991
7 1 p. 47-
1 p.
artikel
22 Encryption and regulatory controls in Europe Lindsay, David
1991
7 1 p. 28-30
3 p.
artikel
23 Expert systems for business - concepts and applications 1991
7 1 p. 47-
1 p.
artikel
24 Hughes v Canon Australia Pty Ltd - a case of loose promises Hughes, Gordon
1991
7 1 p. 33-34
2 p.
artikel
25 IBM to become green consultants - “You read it first in the report!” 1991
7 1 p. 39-
1 p.
artikel
26 Intellectual property protection for encrypted television broadcasts - illegal decoders 1991
7 1 p. 43-
1 p.
artikel
27 International chamber of commerce sets up EDI working party 1991
7 1 p. 40-
1 p.
artikel
28 International symposium on the prevention and prosecution of computer crime 1991
7 1 p. 7-12
6 p.
artikel
29 It and business 1991
7 1 p. 6-
1 p.
artikel
30 Kirby heads OECD committee on data security 1991
7 1 p. 46-
1 p.
artikel
31 Legal protection of computer software 1991
7 1 p. 36-
1 p.
artikel
32 Lotus drops its cd-rom database 1991
7 1 p. 43-
1 p.
artikel
33 Marconi instruments settles dispute with business software alliance 1991
7 1 p. 39-
1 p.
artikel
34 New discussion papers on intellectual property published 1991
7 1 p. 42-
1 p.
artikel
35 New report correspondents 1991
7 1 p. 46-
1 p.
artikel
36 Norwegian ‘Lovdata’ published on cd rom 1991
7 1 p. 43-
1 p.
artikel
37 Proposal for a [European community] council decision in the field of information security Hennessy, Chris
1991
7 1 p. 27-
1 p.
artikel
38 Proposed EC directives on data protection 1991
7 1 p. 20-23
4 p.
artikel
39 Re Gale court of appeal (civil division), unreported, 13 December 1990 1991
7 1 p. 38-
1 p.
artikel
40 R v Whieley, court of appeal (criminal division), the times, 6 February 1991 1991
7 1 p. 38-39
2 p.
artikel
41 Software and the law: The producer's viewpoint - A report on project scope study for the EC Soave, Elissa
1991
7 1 p. 31-32
2 p.
artikel
42 Software directive - in parliament 1991
7 1 p. 25-26
2 p.
artikel
43 Software Under Siege - Viruses and Worms 1991
7 1 p. 30-
1 p.
artikel
44 Spectacular computer crimes 1991
7 1 p. 48-
1 p.
artikel
45 Summary of the main changes 1991
7 1 p. 45-
1 p.
artikel
46 Summary of the report “computer crime in the Netherlands” Charbon, F.H.
1991
7 1 p. 2-6
5 p.
artikel
47 Survey reveals unix is the operating system of the future 1991
7 1 p. 39-40
2 p.
artikel
48 Swindle - How a man named John Grambling Jr cheated banks out of millions 1991
7 1 p. 48-
1 p.
artikel
49 Telecoms news 1991
7 1 p. 41-
1 p.
artikel
50 The caller id debate 1991
7 1 p. 37-
1 p.
artikel
51 The CBI response 1991
7 1 p. 23-24
2 p.
artikel
52 The state treaty as a basis for the creation of a data protection legislation on the territory of the GDR 1991
7 1 p. 18-19
2 p.
artikel
53 United nations un report on International credit transfer 1991
7 1 p. 44-
1 p.
artikel
54 US national group challenges crime laws application 1991
7 1 p. 13-14
2 p.
artikel
                             54 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland