nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Aspects juridiques du paiement par carte
|
|
|
|
4 |
5 |
p. 14 |
artikel |
2 |
CBI Conference on combating computer crime - increasing computer security
|
Wasik, Martin |
|
|
4 |
5 |
p. 4 |
artikel |
3 |
Computer law delegation to east asia
|
|
|
|
4 |
5 |
p. 32-33 |
artikel |
4 |
Computer security
|
|
|
|
4 |
5 |
p. 44 |
artikel |
5 |
Computers in financial trading
|
|
|
|
4 |
5 |
p. 26 |
artikel |
6 |
Congress passes new legislation protecting licensees of intellectual property
|
Shpizner, Esq., Michael J. |
|
|
4 |
5 |
p. 27-28 |
artikel |
7 |
Continuing the series by David Davies Part IV: Why have a strategy
|
Davies, David |
|
|
4 |
5 |
p. 15-17 |
artikel |
8 |
Current awareness
|
|
|
|
4 |
5 |
p. 36-39 |
artikel |
9 |
Custom software source code ownership and access
|
Smith Partner, Graham P. |
|
|
4 |
5 |
p. 21-22 |
artikel |
10 |
Data protection in Ireland: The Netherlands and Switzerland
|
Korn, Anthony |
|
|
4 |
5 |
p. 28 |
artikel |
11 |
Dramatic review: “The hacker and the malevolent employee”; performed at COMPSEC '88
|
Davies, David |
|
|
4 |
5 |
p. 8 |
artikel |
12 |
Editorial
|
|
|
|
4 |
5 |
p. 1 |
artikel |
13 |
Eurodynamics systems PLC-V-general automation ltd. (As yet unreported — September 1988)
|
Greaves, David |
|
|
4 |
5 |
p. 40-41 |
artikel |
14 |
European Study Conferences Ltd
|
Saxby, Stephen |
|
|
4 |
5 |
p. 42-43 |
artikel |
15 |
Forthcoming ESC Conference Computer Disputes—How to handle them
|
|
|
|
4 |
5 |
p. 31 |
artikel |
16 |
Home Informatics — Information Technology and the Transformation of Everyday Life
|
|
|
|
4 |
5 |
p. 39 |
artikel |
17 |
ICC position statement on computer crime computer related crime and criminal law: An international business view - Part II recommended actions
|
|
|
|
4 |
5 |
p. 5-8 |
artikel |
18 |
Information Horizons — The Long Term Social Implications of New Information Technology
|
|
|
|
4 |
5 |
p. 39 |
artikel |
19 |
Law office technology
|
|
|
|
4 |
5 |
p. 44 |
artikel |
20 |
Product testing: liability, acceptance, contract terms
|
Chalton, Simon |
|
|
4 |
5 |
p. 23-26 |
artikel |
21 |
Retaining accounting records
|
|
|
|
4 |
5 |
p. 17 |
artikel |
22 |
Section 69 and all that
|
Tantum, Mark |
|
|
4 |
5 |
p. 13-14 |
artikel |
23 |
Security for small computer systems — a practical guide for users
|
|
|
|
4 |
5 |
p. 41 |
artikel |
24 |
Software escrow arrangements and the insolvency act 1986
|
Millard, Christopher |
|
|
4 |
5 |
p. 18-20 |
artikel |
25 |
Technology's contribution to understanding the world's weather patterns
|
|
|
|
4 |
5 |
p. 29-31 |
artikel |
26 |
Telecommunications law and practice
|
|
|
|
4 |
5 |
p. 31 |
artikel |
27 |
The CBI response to the law commission working paper on conspiracy to defraud
|
|
|
|
4 |
5 |
p. 9-12 |
artikel |
28 |
The law commission's working paper on computer misuse
|
Wasik, Martin |
|
|
4 |
5 |
p. 2-4 |
artikel |
29 |
The PC Security Guide 1988/1989
|
|
|
|
4 |
5 |
p. 41 |
artikel |
30 |
Virus hits major US computer network
|
Zajac Jr., Bernard P. |
|
|
4 |
5 |
p. 34-35 |
artikel |