- David Davies:
Anatomy of a disaster. Comput. Law Secur. Rev. 4(2): 28 (1988) - David Davies:
Lloyds Cash Management Systems (CMS) cover. Comput. Law Secur. Rev. 4(2): 37 (1988) - David Davies:
Successful uses of technology in business. Comput. Law Secur. Rev. 4(2): 41-43 (1988) - David Davies:
The fourth in a series of reports by David Davies analysing the experiences of those involved in a computer disaster. Comput. Law Secur. Rev. 4(4): 2-4 (1988) - David Davies:
High technology risks - The limitations of insurance. Comput. Law Secur. Rev. 4(4): 32-33 (1988) - Brian W. Gray:
Copyright in computer software - Present United States/Canadian law and impact of bill C60. Comput. Law Secur. Rev. 4(2): 11-15 (1988) - David W. Greaves:
US focus. Comput. Law Secur. Rev. 4(1): 33-37 (1988) - David W. Greaves:
Computer software - Protection/liability/law/forms: L.J. Kutten (Clark Boardman Co. Ltd., New York, New York 1907). Comput. Law Secur. Rev. 4(3): 5 (1988) - David W. Greaves:
The EC green paper - A comment. Comput. Law Secur. Rev. 4(4): 5 (1988) - Fred Greguras, Martin Kalin:
Resales and reexports of U.S. commodities and technical data under the U.S. export administration act. Comput. Law Secur. Rev. 4(2): 16 (1988) - Derrick Grover:
Methods for measuring program copying and adaptation. Comput. Law Secur. Rev. 4(2): 23-25 (1988) - Robert Hart, John E. Appleton:
Submission from the British Computer Society. Comput. Law Secur. Rev. 4(4): 5-10 (1988) - Yvo Henniker-Heaton:
Fraud investigation - A perspective on the role of the police. Comput. Law Secur. Rev. 4(1): 7-8 (1988) - Yvo Henniker-Heaton:
The corporate security policy - Part three. Comput. Law Secur. Rev. 4(1): 14-15 (1988) - Yvo Henniker-Heaton:
COMPACS '88. Comput. Law Secur. Rev. 4(2): 39-41 (1988) - Yvo Henniker-Heaton:
The security of network systems - A review. Comput. Law Secur. Rev. 4(4): 34-35 (1988) - Gordon Hughes:
Mindless computers in Australia. Comput. Law Secur. Rev. 4(2): 25-27 (1988) - Pamela Hughes:
NCC information technology conference 1988. Comput. Law Secur. Rev. 4(2): 38 (1988) - C. Attorney Ian Kyer:
Copyright law reform - Canada. Comput. Law Secur. Rev. 4(1): 24-26 (1988) - Steven Larner:
Computer contracts - negotiating for success. Comput. Law Secur. Rev. 4(1): 19-20 (1988) - David P. Lewis:
Protecting your confidential information. Comput. Law Secur. Rev. 4(4): 28-31 (1988) - Colin Long:
Liability for telecommunication services. Comput. Law Secur. Rev. 4(2): 20 (1988) - A. D. Maclean:
Computers in criminal justice - Realising the potential. Comput. Law Secur. Rev. 4(3): 15-17 (1988) - A. D. Maclean:
Computers in criminal justice - Realising the potential: Part II: The future. Comput. Law Secur. Rev. 4(4): 25-26 (1988) - Alfred Meijboom:
Recent developments regarding protection of topographies of semiconductor products. Comput. Law Secur. Rev. 4(2): 10-11 (1988) - Bob Moores:
Professional data storage: The decision criteria. Comput. Law Secur. Rev. 4(1): 15-16 (1988) - Stephen Saxby:
Litigation: Reports on recent cases. Comput. Law Secur. Rev. 4(4): 41-44 (1988) - Joachim Scherer:
Telecommunications terminal equipment: EEC commission opens the market. Comput. Law Secur. Rev. 4(4): 16-19 (1988) - J. A. L. Sterling:
Legislation update. Comput. Law Secur. Rev. 4(1): 42-43 (1988) - J. A. L. Sterling:
The copyright, designs and patents bill 1987. Comput. Law Secur. Rev. 4(3): 11-12 (1988)