nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Anatomy of a disaster
|
Davies, David |
|
|
4 |
2 |
p. 28 |
artikel |
2 |
COMPACS '88
|
Yvo Henniker-Heaton, Sir |
|
|
4 |
2 |
p. 39-41 |
artikel |
3 |
Computer viruses: The new global threat (part II)
|
Zajac Jr., Bernard P. |
|
|
4 |
2 |
p. 30-31 |
artikel |
4 |
Copyright in computer software — Present United States/Canadian law and impact of bill C60
|
Gray, Brain W. |
|
|
4 |
2 |
p. 11-15 |
artikel |
5 |
Current awareness
|
|
|
|
4 |
2 |
p. 31-37 |
artikel |
6 |
Description of amendments to the data protection act found in the data protection (amendment) bill 1988
|
|
|
|
4 |
2 |
p. 6 |
artikel |
7 |
Editorial
|
|
|
|
4 |
2 |
p. 1 |
artikel |
8 |
Fourth report of the director general of telecommunications published
|
|
|
|
4 |
2 |
p. 21-23 |
artikel |
9 |
Improvements to the data protection act 1984 that arise from the data protection (Amendment) bill 1988
|
|
|
|
4 |
2 |
p. 5 |
artikel |
10 |
Liability for telecommunication services
|
Long, Colin |
|
|
4 |
2 |
p. 20 |
artikel |
11 |
Lloyds Cash Management Systems (CMS) cover
|
Davies, David |
|
|
4 |
2 |
p. 37 |
artikel |
12 |
Methods for measuring program copying and adaptation
|
Grover, Derrick |
|
|
4 |
2 |
p. 23-25 |
artikel |
13 |
Mindless computers in Australia
|
Hughes, Gordon |
|
|
4 |
2 |
p. 25-27 |
artikel |
14 |
MP seeks measure for better data protection law — A review
|
Walden, Ian |
|
|
4 |
2 |
p. 2 |
artikel |
15 |
NCC information technology conference 1988
|
Hughes, Pamela |
|
|
4 |
2 |
p. 38 |
artikel |
16 |
Points raised in the consultation process
|
Cohen, Harry |
|
|
4 |
2 |
p. 3-5 |
artikel |
17 |
Publications data
|
|
|
|
4 |
2 |
p. 43-44 |
artikel |
18 |
Recent developments regarding protection of topographies of semiconductor products
|
Meijboom, Alfred |
|
|
4 |
2 |
p. 10-11 |
artikel |
19 |
Resales and reexports of U.S. commodities and technical data under the U.S. export administration act
|
Greguras, Fred M. |
|
|
4 |
2 |
p. 16 |
artikel |
20 |
Successful uses of technology in business
|
Davies, David |
|
|
4 |
2 |
p. 41-43 |
artikel |
21 |
Temporary export of personal computers simplified
|
|
|
|
4 |
2 |
p. 20 |
artikel |
22 |
“The computer” — The changing risk
|
Davies, David |
|
|
4 |
2 |
p. 27-28 |
artikel |
23 |
The data protection amendment bill
|
|
|
|
4 |
2 |
p. 2-3 |
artikel |