nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
BCS issues computer security guide
|
|
|
|
6 |
4 |
p. 15 |
artikel |
2 |
Capital allowances of leased software
|
Bull, Gillian |
|
|
6 |
4 |
p. 14-15 |
artikel |
3 |
CLSR briefing
|
|
|
|
6 |
4 |
p. 37-40 |
artikel |
4 |
Computer hacking — The new boom industry
|
Zajac Jr., Bernard P. |
|
|
6 |
4 |
p. 29 |
artikel |
5 |
Computer risk manager — A manual for EDP contingency planning
|
|
|
|
6 |
4 |
p. 4 |
artikel |
6 |
Computer software and the EEC rules on competition and copyright
|
|
|
|
6 |
4 |
p. 32 |
artikel |
7 |
Developments in electronic messaging
|
|
|
|
6 |
4 |
p. 5-8 |
artikel |
8 |
EDI control guide: Make your business more competitive
|
|
|
|
6 |
4 |
p. 36 |
artikel |
9 |
Editorial
|
|
|
|
6 |
4 |
p. 1 |
artikel |
10 |
Electronic highways for world trade — Issues in telecommunication and data services, 1989
|
|
|
|
6 |
4 |
p. 8 |
artikel |
11 |
Insuring computer virus
|
Davies, David |
|
|
6 |
4 |
p. 20-21 |
artikel |
12 |
International legal protection for software
|
Jerrard, D.G. |
|
|
6 |
4 |
p. 13 |
artikel |
13 |
Look and feel has UK copyright protection
|
Sykes, John R.H. |
|
|
6 |
4 |
p. 30-31 |
artikel |
14 |
Maroon district council case study
|
Bull, Gillian |
|
|
6 |
4 |
p. 2-4 |
artikel |
15 |
Misuse of copyright as defense to software infringement claim
|
Greguras, Fred M. |
|
|
6 |
4 |
p. 35-36 |
artikel |
16 |
News of the Uruguay round of multilateral trade negotiations
|
|
|
|
6 |
4 |
p. 9-10 |
artikel |
17 |
Part II — Existing regulations applicable to medical data cards
|
Poullet, Y. |
|
|
6 |
4 |
p. 25-28 |
artikel |
18 |
Proposed standard contract for minor computer procurements from the danish general services administration
|
Andersen, MadsBryde |
|
|
6 |
4 |
p. 19 |
artikel |
19 |
Supplier of office facilities liable in contract and tort for theft losses
|
Saxby, Stephen |
|
|
6 |
4 |
p. 31-32 |
artikel |
20 |
The audit commission's next computer fraud and abuse survey
|
|
|
|
6 |
4 |
p. 16 |
artikel |
21 |
The computer health risk
|
Davies, David |
|
|
6 |
4 |
p. 17-19 |
artikel |
22 |
The EC data protection directive
|
Dresner, Stewart |
|
|
6 |
4 |
p. 22-24 |
artikel |
23 |
The implications of the lotus 1-2-3 copyright infringement decision
|
Greguras, Fred M. |
|
|
6 |
4 |
p. 33-35 |
artikel |
24 |
The OTA report — Background paper — Summary, overview and issues
|
|
|
|
6 |
4 |
p. 11-13 |
artikel |
25 |
The thirteenth congress of comparative law, Montreal, Canada
|
|
|
|
6 |
4 |
p. 32 |
artikel |