nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Books
|
|
|
1989 |
1990 |
1 |
p. 27- 1 p. |
artikel |
2 |
Case law and implications of hacking
|
Kelman, Alistair |
|
1989 |
1990 |
1 |
p. 5-7 3 p. |
artikel |
3 |
Computer misuse
|
Amery, Chris |
|
1989 |
1990 |
1 |
p. 25- 1 p. |
artikel |
4 |
Computer misuse: Fact or invention
|
Nicholson, Emma |
|
1989 |
1990 |
1 |
p. 2-4 3 p. |
artikel |
5 |
Computer misuse: Law reform proposals
|
Wasik, Martin |
|
1989 |
1990 |
1 |
p. 7-9 3 p. |
artikel |
6 |
Editorial
|
|
|
1989 |
1990 |
1 |
p. 1- 1 p. |
artikel |
7 |
Events
|
|
|
1989 |
1990 |
1 |
p. 27- 1 p. |
artikel |
8 |
Hacking: An abuse of privilege
|
Blatchford, Clive |
|
1989 |
1990 |
1 |
p. 21-24 4 p. |
artikel |
9 |
Hacking and the law: The way forward
|
Court, John |
|
1989 |
1990 |
1 |
p. 18-21 4 p. |
artikel |
10 |
Hacking: Bulletin boards as sources of information
|
Frost, Chris |
|
1989 |
1990 |
1 |
p. 16-17 2 p. |
artikel |
11 |
Hacking out computer legislation
|
Castell, Stephen |
|
1989 |
1990 |
1 |
p. 10-13 4 p. |
artikel |
12 |
Hacking: The threats
|
Potts, Richard J. |
|
1989 |
1990 |
1 |
p. 14-15 2 p. |
artikel |
13 |
ICAEW information technology prize for 1989 goes to anti-viral product
|
Cohen, Fred |
|
1989 |
1990 |
1 |
p. 15- 1 p. |
artikel |
14 |
News
|
|
|
1989 |
1990 |
1 |
p. 25-26 2 p. |
artikel |
15 |
News
|
|
|
1989 |
1990 |
1 |
p. 24- 1 p. |
artikel |
16 |
News
|
|
|
1989 |
1990 |
1 |
p. 13- 1 p. |
artikel |
17 |
Summary of ‘The anti-hacking bill 1989’ as originally proposed by emma nicholson
|
|
|
1989 |
1990 |
1 |
p. 4- 1 p. |
artikel |