- Neil A. McEvoy:
Information security II. Comput. Law Secur. Rev. 10(1): 31-32 (1994) - Gyorgy Palos:
The impact of the Hungarian - USA agreement on the Hungarian intellectual property law. Comput. Law Secur. Rev. 10(4): 185-188 (1994) - Alastair Ross:
The essentials of EDI law - A Straightforward legal framework to protect your business: Peter Jones and David Marsh 1993 Softcover 141p. Comput. Law Secur. Rev. 10(2): 91 (1994) - Heather Rowe:
Data protection. Comput. Law Secur. Rev. 10(1): 47 (1994) - Heather Rowe:
Draft UK data protection bill. Comput. Law Secur. Rev. 10(5): 280 (1994) - Georgi Sarakinov:
New law on copyright and neighbouring rights in Bulgaria. Comput. Law Secur. Rev. 10(4): 189-190 (1994) - Graham J. H. Smith:
When is a computer not a computer? Comput. Law Secur. Rev. 10(2): 84-85 (1994) - Katherine C. Spelman, John Moss:
The intellectual property inventory: Why do it? Comput. Law Secur. Rev. 10(1): 22-24 (1994) - Robert Strivens:
EC competition law. Comput. Law Secur. Rev. 10(3): 121-122 (1994) - Moira Sympson:
999 !: My computer's stopped breathing ! Comput. Law Secur. Rev. 10(2): 76-81 (1994) - Colin Tapper:
The law commission's report on the reform of the hearsay rule: Its impact upon the reception of computer output. Comput. Law Secur. Rev. 10(2): 86-88 (1994) - Irini E. Vassilaki:
Interception of telecommunications for criminal investigation - a comparative analysis. Comput. Law Secur. Rev. 10(5): 238-242 (1994) - Conor Ward:
Cheating at cards, plastic fraud: Sharp Practices and naive systems: Naive Systems by Bryan Clough, 1994, Soft Cover, 154pp., ISBN 090 792 3283. Comput. Law Secur. Rev. 10(6): 284 (1994) - John Worthy:
Software law. Comput. Law Secur. Rev. 10(3): 123-126 (1994) - Benjamin Wright:
Electronic commerce. Comput. Law Secur. Rev. 10(6): 311-312 (1994) - Bernard P. Zajac Jr.:
Clinton administration proposes national telecommunications policy. Comput. Law Secur. Rev. 10(2): 96 (1994) - Bernard P. Zajac Jr.:
US focus. Comput. Law Secur. Rev. 10(6): 322-323 (1994)