Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             34 results found
no title author magazine year volume issue page(s) type
1 A legislative history of the communications act of 1934
7 2 p. 71
article
2 Amongst friends in computers and law — A collection of essays in remembrance of Guy Vandenberghe
7 2 p. 96
article
3 A review of the new Lloyds electronic and computer crime policy Davies, David

7 2 p. 82
article
4 Australian computer virus prosecution Lynn v Barylak (February 1991) county court victoria Hughes, Gordon

7 2 p. 79-81
article
5 Computer software protection/liability/law/forms
7 2 p. 81
article
6 Computer viral risks — is the worst yet to come? an eerie look into the future Zajac Jr., Bernard P.

7 2 p. 77-78
article
7 Editorial
7 2 p. 49
article
8 Electronically recorded evidence — A guide to the use of tape and video recording in criminal and civil proceedings
7 2 p. 94
article
9 Ethics and computing (Part II) Zajac Jr., Bernard P.

7 2 p. 83
article
10 European initiatives in public procurement Lewis, Mark

7 2 p. 95-96
article
11 Expert systems in auditing
7 2 p. 94
article
12 How to perfect security interest in software Wernick, Alan S.

7 2 p. 61-62
article
13 Information law der Mirjana, Drakulić

7 2 p. 63-65
article
14 Intellectual property — A manager's guide
7 2 p. 65
article
15 International legal protection for software
7 2 p. 53-59
article
16 Legal and economic aspects of telecommunications
7 2 p. 71
article
17 Legislative/regulatory developments in information technology and law from the US Bequai, August

7 2 p. 84-85
article
18 Letter
7 2 p. 52
article
19 Maintenance under the EEC directive on the legal protection of computer programs Hart, Robert

7 2 p. 51-52
article
20 Managing information security — A non-technical management guide Zajac Jr., Bernard P.

7 2 p. 76
article
21 New report correspondent
7 2 p. 76
article
22 News and comment on recent developments from around the world
7 2 p. 86-94
article
23 Nordic studies in information technology and law
7 2 p. 96
article
24 Professional issues in software engineering
7 2 p. 69
article
25 Protecting business ideas - an introduction Irish, Vivien

7 2 p. 60-61
article
26 Security precautions for the disposal of confidential data Bowles, Michael

7 2 p. 75-76
article
27 Seminar
7 2 p. 74
article
28 System development auditing: A risk based approach MacWillson, Alastair

7 2 p. 72-74
article
29 The EC commission green paper on satellite communications Rowe, Heather

7 2 p. 68-69
article
30 The EC software directive: A user's perspective White, Chris

7 2 p. 50-51
article
31 The first personal data protection act in Yugoslavia Nelka Fikeys Krmić, L.L.M.

7 2 p. 66-67
article
32 The law of information technology in Europe 1992 — A comparison with the USA
7 2 p. 96
article
33 The United Kingdom Duopoly review Rowe, Heather

7 2 p. 70-71
article
34 Transborder flow of personal data within the EC
7 2 p. 96
article
                             34 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands