nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Airline passengers' data: adoption of an adequacy decision by the European Commission. How will the story end?
|
Pérez Asinari, María Verónica |
|
|
20 |
5 |
p. 370-376 |
artikel |
2 |
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications
|
Halliday, David |
|
|
20 |
5 |
p. 411-414 |
artikel |
3 |
Calendar of events
|
|
|
|
20 |
5 |
p. 432 |
artikel |
4 |
Computer Law: Computer Law 5th Edition
|
Reed, Chris |
|
|
20 |
5 |
p. 431 |
artikel |
5 |
Computer Law: Introduction to Computer Law 5th Edition
|
Bainbridge, David |
|
|
20 |
5 |
p. 431 |
artikel |
6 |
Cryptography: Malicious Cryptography – Exposing Cryptovirology
|
Young, Adam L. |
|
|
20 |
5 |
p. 430 |
artikel |
7 |
Database rights: The Advocate General issues her opinion in British Horseracing Board v. William Hill
|
Everitt, Charlie |
|
|
20 |
5 |
p. 405-407 |
artikel |
8 |
Data protection law under scrutiny
|
Saxby, Stephen |
|
|
20 |
5 |
p. 355 |
artikel |
9 |
Exploiting holes in software security: The Shellcoder's Handbook – Discovery and exploiting security holes
|
Koziol, |
|
|
20 |
5 |
p. 430 |
artikel |
10 |
Guide for authors
|
|
|
|
20 |
5 |
p. 354 |
artikel |
11 |
Is further legislation really necessary to level the playing field? A UK perspective
|
James, Will |
|
|
20 |
5 |
p. 356-363 |
artikel |
12 |
Lessons learned from the Italian law on privacy – Part II
|
Perri, Pierluigi |
|
|
20 |
5 |
p. 384-389 |
artikel |
13 |
Managing Communications: Managing Communications in a Crises Peter Ruff and Khalid Asis
|
Peter Ruff, Crises |
|
|
20 |
5 |
p. 430 |
artikel |
14 |
Metatags and banner advertisements – do they infringe trade mark rights?
|
Chaudri, Abida |
|
|
20 |
5 |
p. 402-404 |
artikel |
15 |
News and comment on recent developments from around the world
|
Saxby, Stephen |
|
|
20 |
5 |
p. 415-429 |
artikel |
16 |
Security in data communications: Security in Fixed and Wireless Networks – An introduction to securing data communications
|
Schafer, Gunter |
|
|
20 |
5 |
p. 431 |
artikel |
17 |
Sports body scores victory – Morris Communications Corp. v. PGA Tour (11thCir. CA)
|
Khandke, Satish |
|
|
20 |
5 |
p. 408-410 |
artikel |
18 |
The protection of databases under EU and US law – the sui generis right as an appropriate concept? Part II
|
Hladjk, Jörg |
|
|
20 |
5 |
p. 377-383 |
artikel |
19 |
The world's current legislative efforts against cyber crime
|
Nykodym, Nick |
|
|
20 |
5 |
p. 390-395 |
artikel |
20 |
Using technology to protect copyright works
|
Bainbridge, David |
|
|
20 |
5 |
p. 364-369 |
artikel |
21 |
When it is and isn't mobile
|
Hardy, Alice |
|
|
20 |
5 |
p. 400-401 |
artikel |
22 |
Who bears the risk of mistake?
|
Leng, Ter Kah |
|
|
20 |
5 |
p. 396-399 |
artikel |
23 |
Workshop on Regulation of Privacy On-and Off-line in the Age of Technology, Cape Town, 3-6 January 2005
|
|
|
|
20 |
5 |
p. 432 |
artikel |